Phoenix Contact Automation Worx <= 1.87: out-of-bounds read remote code execution
CVE-2020-12498

7.8HIGH

Key Information:

Vendor
CVE Published:
1 July 2020

Summary

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

Affected Version(s)

Automation Worx <= 1.87

Automation Worx Express <= 1.87

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

reported by mdm working with Trend Micro Zero Day Initiative, Phoenix Contact reported to CERT@VDE
.
CVE-2020-12498 : Phoenix Contact Automation Worx <= 1.87: out-of-bounds read remote code execution | SecurityVulnerability.io