Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phoenixcontact vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2020-12524
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
Phoenixcontact Btp 2043w Firmware
Phoenixcontact Btp 2070w Firmware
Phoenixcontact Btp 2102w Firmware
694
VMScore
CVE-2018-16994
An issue exists on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contac...
Phoenixcontact Axl F Bk Pn Firmware
Phoenixcontact Axl F Bk Eth Firmware
Phoenixcontact Axl F Bk Eth Xc Firmware
890
VMScore
CVE-2022-31801
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Multiprog
Phoenixcontact Proconos
Phoenixcontact-software Proconos Eclr -
1 Article
605
VMScore
CVE-2019-16675
An issue exists in PHOENIX CONTACT PC Worx up to and including 1.86, PC Worx Express up to and including 1.86, and Config+ up to and including 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to ...
Phoenixcontact Pc Worx Express
Phoenixcontact Config\\+
Phoenixcontact Pc Worx
454
VMScore
CVE-2021-33542
Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialize...
Phoenixcontact Config\\+
Phoenixcontact Pc Worx
Phoenixcontact Pc Worx Express
632
VMScore
CVE-2019-10997
An issue exists on Phoenix Contact AXC F 2152 (No.2404267) prior to 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) prior to 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC s...
Phoenixcontact Axc F 2152 Firmware
Phoenixcontact Axc F 2152 Starterkit Firmware
694
VMScore
CVE-2021-33541
Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to ca...
Phoenixcontact Ilc1x0 Firmware
Phoenixcontact Ilc1x1 Firmware
409
VMScore
CVE-2019-10998
An issue exists on Phoenix Contact AXC F 2152 (No.2404267) prior to 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) prior to 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication ...
Phoenixcontact Axc F 2152 Firmware
Phoenixcontact Axc F 2152 Starterkit Firmware
NA
CVE-2023-0757
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to upload arbitrary malicious code and gain full access on the affected device.
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
NA
CVE-2023-5592
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote malicious user to download and execute applications without integrity checks on the device which may result in a complete loss...
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »