Zurück zur Übersicht

PHOENIX CONTACT: Two Vulnerabilities in Automation Worx Suite

VDE-2020-023
Last update
14.05.2025 14:28
Published at
01.07.2020 10:25
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2020-023
CSAF Document

Summary

Manipulated PC Worx projects could lead to a remote code execution due to insufficient input
data validation.

The attacker needs to get access to an original PC Worx project to be able to manipulate data
inside the project folder. After manipulation the attacker needs to exchange the original files by
the manipulated ones on the application programming workstation.

Impact

Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

Affected Product(s)

Model no. Product name Affected versions
Software PC Worx <=1.87 Software PC Worx <=1.87
Software PC Worx Express <=1.87 Software PC Worx Express <=1.87

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Stack-based Buffer Overflow (CWE-121)
Summary

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

References

Published
22.09.2025 14:57
Weakness
Stack-based Buffer Overflow (CWE-121)
Summary

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

References

Mitigation

We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.
In addition, we recommend exchanging or storing project files together with a checksum to ensure their integrity.

Remediation

With the next version of Automation Worx Software Suite a sharpened input data validation with respect to buffer size and description of size and number of objects referenced in a file will be implemented.

Revision History

Version Date Summary
1 01.07.2020 10:25 Initial revision.
2 14.05.2025 14:28 Fix: version space, added distribution