Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware
Multiple Linux kernel vulnerabilities exist in PLCnext Firmware affecting several controller models. The vulnerabilities include use-after-free (CWE-416), race conditions (CWE-362, CWE-367), and symlink/path traversal issues (CWE-59, CWE-606, CWE-1325). These allow remote code execution without authentication on affected controllers running firmware versions prior to 2024.0.6 LTS. Phoenix Contact has issued firmware 2024.0.6 LTS with fixes for AXC F, RFC, and BPC series controllers; however, EPC 1502 and EPC 1522 will not receive patches.
- Network reachability to the PLCnext controller
- Controller running firmware version earlier than 2024.0.6 LTS
- No additional authentication required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fe171957-f990-406c-98e5-8834ed5184d8Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.