Phoenix Contact: PLCnext Control prone to download of code without integrity check
PLCnext Control application files (logic, executables, configurations) lack robust integrity verification. An authenticated attacker could craft malicious application files in a way that bypasses the integrity check mechanism, allowing unauthorized modifications to be loaded onto the PLC undetected. PLCnext Engineer should warn users of integrity mismatches when in Online mode, but a skilled attacker could potentially craft changes that evade this detection. The vulnerability affects all current PLCnext Control hardware platforms through version 2024.0, and the vendor has not released patches.
- Valid engineering workstation credentials (PLCnext Engineer user account)
- Network access to the PLC (direct engineering connection or remote access)
- Knowledge of PLCnext application file structure and integrity check mechanisms
- Access to PLC application files during engineering phase or through compromised engineering workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/361e2066-b93d-42c3-adbc-f758bf8197c1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.