Page 6 of 101 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

02 Dec 2020 — Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service). Un Consumo No Controlado de Recursos puede ser explotado para causar que las HMIs Phoenix Contact versiones BTP 2043W, BTP 2070W y BTP 2102W en todas las versiones dejen de responder y no actualicen con precisión el contenido de la pantalla (Denegación de Servicio) • https://cert.vde.com/en-us/advisories/vde-2020-047 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

21 Jul 2020 — In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files. En PHOENIX CONTACT PLCnext Engineer versión 2020.3.1 y anteriores, presenta una vulnerabilidad de saneamiento de ruta inapropiada en la importación de archivos de proyecto • https://cert.vde.com/en-us/advisories/vde-2020-025 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

01 Jul 2020 — PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. El análisis de archivos XML de PLCopen en Phoenix Contact PC Worx y PC Worx Express versiones 1.87 y anteriores, puede conllevar un desbordamiento en la región stack de la memoria. Los proyectos manipulados de PC Worx podrían conducir a una ejecución de código remota d... • https://cert.vde.com/de-de/advisories/vde-2020-023 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

01 Jul 2020 — mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. El análisis de archivos mwe en Phoenix Contact PC Worx y PC Worx Express versiones 1.87 y anteriores, es vulnerable a una ejecución de código remota de lectura fuera de límites. Los proyectos manipulados de PC Worx podría conllevar a una ejecución de cód... • https://cert.vde.com/de-de/advisories/vde-2020-023 • CWE-121: Stack-based Buffer Overflow CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

27 Mar 2020 — Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service. Una Escalada de Privilegios Local puede presentarse en PHOENIX CONTACT PORTICO SERVER versiones hasta 3.0.7, cuando era instalado para ejecutarse como un servicio. • https://cert.vde.com/en-us/advisories/vde-2020-013 • CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

27 Mar 2020 — Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation. Permisos de ruta predeterminados y no seguros en PHOENIX CONTACT PC WORX SRT versiones hasta 1.14, permiten una escalada de privilegios local. • https://cert.vde.com/en-us/advisories/vde-2020-012 • CWE-276: Incorrect Default Permissions •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 3

12 Mar 2020 — PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certific... • https://packetstorm.news/files/id/156729 • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.0EPSS: 1%CPEs: 12EXPL: 3

12 Mar 2020 — PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL. PHOENIX CONTACT TC ROUTER 3002T-4G versiones hasta 2.05.3, TC ROUTER 2002T-3G versiones hasta 2.05.3, TC ROUTER 3002T-4G VZW versiones hasta 2.05.3, T... • https://packetstorm.news/files/id/156729 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 6EXPL: 0

18 Feb 2020 — An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required. Se descubrió un problema en PHOENIX CONTACT AXL F... • https://psirt.bosch.com/security-advisories/bosch-sa-645125.html •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

18 Feb 2020 — Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2GC-2SFP devices before V2.90 when using MAC-based port security. Se presenta un control de acceso inapropiado en los dispositivos PHOENIX CONTACT FL NAT 2208 versiones anteriores a V2.90 y los dispositivos FL NAT 2304-2GC-2SFP versiones anteriores a V2.90, cuando se usa la seguridad de puerto basada en MAC. • https://cert.vde.com/de-de/advisories/vde-2019-020 •