CVE-2023-46144
PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
< 1%
*EPSS
Affected Versions
9
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices.
Una descarga de código sin vulnerabilidad de verificación de integridad en los productos PLCnext permite que un atacante remoto con privilegios bajos comprometa la integridad de la estación de ingeniería afectada y los dispositivos conectados.
*Credits:
Reid Wightman of Dragos, Inc.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-10-17 CVE Reserved
- 2023-12-14 CVE Published
- 2024-10-01 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-494: Download of Code Without Integrity Check
CAPEC
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|