Show filters
158 Total Results
Displaying 101-110 of 158
Sort by:
Attacker Value
Unknown
CVE-2020-12524
Disclosure Date: December 02, 2020 (last updated February 22, 2025)
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
0
Attacker Value
Unknown
CVE-2020-12499
Disclosure Date: July 21, 2020 (last updated February 21, 2025)
In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files.
0
Attacker Value
Unknown
CVE-2020-12497
Disclosure Date: July 01, 2020 (last updated February 21, 2025)
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
0
Attacker Value
Unknown
CVE-2020-12498
Disclosure Date: July 01, 2020 (last updated February 21, 2025)
mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
0
Attacker Value
Unknown
CVE-2020-10940
Disclosure Date: March 27, 2020 (last updated February 21, 2025)
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
0
Attacker Value
Unknown
CVE-2020-10939
Disclosure Date: March 27, 2020 (last updated February 21, 2025)
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
0
Attacker Value
Unknown
CVE-2020-9435
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certificate during installation.
0
Attacker Value
Unknown
CVE-2020-9436
Disclosure Date: March 12, 2020 (last updated February 21, 2025)
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.
0
Attacker Value
Unknown
CVE-2018-16994
Disclosure Date: February 18, 2020 (last updated November 28, 2024)
An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.
0
Attacker Value
Unknown
CVE-2019-18352
Disclosure Date: February 18, 2020 (last updated November 27, 2024)
Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2GC-2SFP devices before V2.90 when using MAC-based port security.
0