CVE-2023-46144 – PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check
https://notcve.org/view.php?id=CVE-2023-46144
A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices. Una descarga de código sin vulnerabilidad de verificación de integridad en los productos PLCnext permite que un atacante remoto con privilegios bajos comprometa la integridad de la estación de ingeniería afectada y los dispositivos conectados. • https://https://cert.vde.com/en/advisories/VDE-2023-056 • CWE-494: Download of Code Without Integrity Check •
CVE-2023-46142 – PHOENIX CONTACT: Insufficient Read and Write Protection to Logic and Runtime Data in PLCnext Control
https://notcve.org/view.php?id=CVE-2023-46142
A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices. Una asignación de permiso incorrecta para una vulnerabilidad de recursos críticos en los productos PLCnext permite que un atacante remoto con privilegios bajos obtenga acceso completo a los dispositivos afectados. • https://https://cert.vde.com/en/advisories/VDE-2023-056 • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2021-34570 – Phoenix Contact: DoS for PLCnext Control devices in versions prior to 2021.0.5 LTS
https://notcve.org/view.php?id=CVE-2021-34570
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests. Múltiples dispositivos de control Phoenix Contact PLCnext en versiones anteriores a 2021.0.5 LTS, son propensos a un ataque DoS mediante peticiones JSON especialmente diseñadas • https://cert.vde.com/en/advisories/VDE-2021-029 • CWE-20: Improper Input Validation •