Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware
Multiple Linux component vulnerabilities exist in Phoenix Contact PLCnext Firmware across AXC F, RFC, BPC, and EPC series controllers. These vulnerabilities allow remote code execution, unauthorized access to sensitive data, and denial of service attacks on affected devices. Vulnerabilities stem from buffer overflows, path traversal, improper input validation, and insecure cryptographic implementations within embedded Linux components. All affected products can be patched with latest firmware releases (2024.0.6 LTS for most models, 2024.0.3 LTS for EPC series).
- Network access to the PLCnext controller Ethernet port (port 443 or other exposed services)
- No authentication required for exploitation
- Affected firmware version running on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fe72774a-36a6-4130-8398-a3fd32251932Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.