Phoenix Contact: Device and Update Management Windows Installer Privilege Escalation
Plan Patch7.8VDE-2025-063Aug 12, 2025
Attack VectorLocal
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary
A privilege escalation vulnerability exists in Phoenix Contact Device and Update Management (DaUM) prior to version 2025.3.1 due to misconfigured permissions on nssm.exe in the DAUM-WINDOWS-SERVICE. A low-privileged local user can execute arbitrary code with administrative privileges on the DaUM workstation.
What this means
What could happen
A low-privileged user on a workstation running Phoenix Contact DaUM can escalate their privileges to administrator level and execute arbitrary commands, potentially gaining full control of the device management system and all connected industrial equipment.
Who's at risk
Water utilities and municipal electric utilities using Phoenix Contact DaUM for device provisioning and firmware updates. This affects IT staff and engineers who use DaUM workstations to manage remote terminal units (RTUs), programmable logic controllers (PLCs), and other field devices.
How it could be exploited
An attacker with local access to a workstation running DaUM exploits misconfigured file permissions on nssm.exe (a service management utility) to execute arbitrary code with administrator privileges. This allows the attacker to modify device configurations, deploy malicious updates to connected industrial devices, or disable monitoring and security controls.
Prerequisites
- Local access to a workstation running DaUM
- Low-privileged user account on that workstation
- DaUM version prior to 2025.3.1
local code executionprivilege escalation to administratorlow complexity attackaffects device management infrastructure
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
DaUM <2025.3.1DaUM<2025.3.12025.3.1
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate DaUM to version 2025.3.1 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/1c3be202-c8d1-468d-aee6-ac1aa4c6a238