Phoenix Contact: PLCnext prone to Incorrect Permission Assignment for Critical Resource
PLCnext Control devices contain a permission assignment flaw (CWE-732) in their application integrity verification. An authenticated attacker with access to engineering tools, stored applications, or the PLC itself could craft a specially modified application file in a way that bypasses the integrity check. This would allow undetected tampering with PLC logic, configurations, and executable code. The vulnerability is difficult to detect once exploited because the integrity verification mechanism is circumvented. Affected devices include AXC F 1152/2152/3152, BPC 9102S, EPC 1502/1522, RFC 4072R/S, and PLCnext Engineer software (all versions through 2024.0).
- Valid PLCnext Engineer credentials or engineering workstation access
- Access to the stored application file (on engineering station, during download, or in PLC storage)
- Understanding of PLCnext application structure to craft tampering that bypasses integrity checks
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1b5a65a4-048d-4d51-a251-3eb01cea7225Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.