Advisories

Für CVSS 2.0, 3.0 und 3.2
VDE-2021-036
Mai 14, 2025, 2:28 nachm.
Please consult the CVE entries above for more details.
VDE-2020-025
Mai 14, 2025, 2:28 nachm.
The build settings of a PLCnext Engineer project (.pcwex) can be manipulated in a way that can result in the execution of remote code. The attacker needs to get access …
VDE-2021-023
Mai 14, 2025, 2:28 nachm.
Multiple vulnerabilities have been discovered in the current firmware of the PHOENIX CONTACT FL SWITCH SMCS series switches.
VDE-2019-006
Mai 14, 2025, 2:28 nachm.
After login the source IP is used as the session identifier, so that users sharing the same source IP are able to gain full authenticated access to the WEB-UI. The …
VDE-2021-024
Mai 14, 2025, 2:28 nachm.
The vulnerability is a Time-of-Check-Time-of-Use (CWE-367) issue which allows an attacker with access to the firmware update file to overwrite it after it has been verified (but before installation is …
VDE-2018-001
Mai 14, 2025, 2:28 nachm.
The integrity of the mGuard firmware atomic update process cannot be guaranteed under all circumstances. The mGuard atomic update mechanism relies on internal checksums for the integrity verification of some …
VDE-2025-029
Mai 14, 2025, 2:28 nachm.
A denial of service (DoS) attack targeting port 80 (http service) can overload the device (CWE-770). This behaviour has been observed when running network security scanners.
VDE-2020-047
Mai 14, 2025, 2:28 nachm.
Uncontrolled Resource Consumption can be exploited to cause the HMI to become unresponsive and not accurately update the display content (Denial of Service).