Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware
Multiple vulnerabilities in PLCnext firmware allow low-privileged remote attackers to escalate privileges, trigger system reboots, or expose critical system files by exploiting improper handling of symbolic links and configuration files in the watchdog, arp-preinit, and security-profile services. The vulnerabilities stem from insufficient permission checks (CWE-276) and improper restriction of rendered UI layers by pathname (CWE-59). Affected devices include AXC F 1152, AXC F 2152, AXC F 3152, RFC 4072S, and BPC 9102S running firmware below version 2025.0.2.
- User-level or operator access to the PLCnext device (remote or local)
- Direct access to configuration directories or services that handle symbolic links
- PLCnext firmware version below 2025.0.2
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6c354d20-4b32-456c-b5eb-2f166db6680fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.