Back to overview

PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT

VDE-2020-012
Last update
05/22/2025 15:03
Published at
03/27/2020 10:47
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2020-012
CSAF Document

Summary

The Phoenix Contact application 'PC WORX SRT' is installed as service. The installation path of the application is configured to have insecure permissions which allows any unprivileged user to write arbitrary files to the installation directory where all the configuration files and binaries of the service are located.

Impact

A malicious user can leverage this knowledge and override the main 'PC WORX SRT' service with a rogue binary which will result with running malicious code as SYSTEM user.

Affected Product(s)

Model no. Product name Affected versions
2701680 Software PC WORX SRT <=1.14 Software PC WORX SRT <=1.14

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Improper Privilege Management (CWE-269)
Summary

Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.

References

Mitigation

Customers using PC WORX SRT are strongly recommended to use the software only on single user systems where restricting the access rights of the PC WORX SRT is not necessary.

Phoenix Contact strongly recommends protection measures against unauthorized access for network-compatible devices, solutions and PC-based software. For detailed information please refer to our application note:

Measures to protect network-compatible devices with communication interfaces, solutions and PC-based software against unauthorized access

Revision History

Version Date Summary
1 03/27/2020 10:47 Initial revision.
2 11/06/2024 12:27 Fix: correct certvde domain, added self-reference
3 05/22/2025 15:03 Fix: version space, quotation mark