Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phoenixcontact vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2018-16994
An issue exists on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contac...
Phoenixcontact Axl F Bk Pn Firmware
Phoenixcontact Axl F Bk Eth Firmware
Phoenixcontact Axl F Bk Eth Xc Firmware
5
CVSSv2
CVE-2020-12524
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
Phoenixcontact Btp 2043w Firmware
Phoenixcontact Btp 2070w Firmware
Phoenixcontact Btp 2102w Firmware
10
CVSSv2
CVE-2022-31801
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Multiprog
Phoenixcontact Proconos
Phoenixcontact-software Proconos Eclr -
1 Article
5.1
CVSSv2
CVE-2021-33542
Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialize...
Phoenixcontact Config\\+
Phoenixcontact Pc Worx
Phoenixcontact Pc Worx Express
6.8
CVSSv2
CVE-2019-16675
An issue exists in PHOENIX CONTACT PC Worx up to and including 1.86, PC Worx Express up to and including 1.86, and Config+ up to and including 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to ...
Phoenixcontact Pc Worx Express
Phoenixcontact Config\\+
Phoenixcontact Pc Worx
4.6
CVSSv2
CVE-2019-10998
An issue exists on Phoenix Contact AXC F 2152 (No.2404267) prior to 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) prior to 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication ...
Phoenixcontact Axc F 2152 Firmware
Phoenixcontact Axc F 2152 Starterkit Firmware
7.1
CVSSv2
CVE-2019-10997
An issue exists on Phoenix Contact AXC F 2152 (No.2404267) prior to 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) prior to 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC s...
Phoenixcontact Axc F 2152 Firmware
Phoenixcontact Axc F 2152 Starterkit Firmware
7.8
CVSSv2
CVE-2021-33541
Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to ca...
Phoenixcontact Ilc1x0 Firmware
Phoenixcontact Ilc1x1 Firmware
NA
CVE-2023-5592
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to download and execute applications without integrity checks on the device which may result in a complete loss...
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
NA
CVE-2023-0757
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to upload arbitrary malicious code and gain full access on the affected device.
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »