Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL
OpenSSL vulnerabilities (CWE-787 buffer overflow) affect numerous Phoenix Contact industrial devices used in energy infrastructure. An authenticated attacker with high privileges can upload malicious firmware or digitally signed objects to devices, leading to arbitrary code execution. The vulnerability requires an attacker to have valid engineering or administrator credentials and access to the device's management interface. Attacks involve uploading crafted files that exploit the underlying OpenSSL vulnerability during firmware installation or signature verification.
- Network access to the device's management interface (web UI or SSH)
- Valid high-privilege credentials (engineering workstation account or administrator login)
- Ability to upload files to the device
- Device firmware version below the patched release
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3086a261-a692-4f3f-ade7-807cbf80a40bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.