Article No° | Product Name | Affected Version(s) |
---|---|---|
Activation Wizard | <= 1.4 | |
1153509 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1153513 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1086929 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1153516 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1086891 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1153508 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1153520 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1086921 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1086889 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
1086920 | E-Mobility Charging Suite license codes for EV Charging Suite Setup | <= 1.7.3 |
2702889 | FL Network Manager | <= 5.0 |
1083065 | IOL-CONF | <= 1.7.0 |
1046008 | PC Worx Engineer | <= 2021.06 |
1165889 | PLCNEXT ENGINEER EDU LIC | <= 2021.06 |
Please consult the CVE entries above for more details.
An attacker may use the above-described vulnerabilities to perform a Denial of Service attack.
Phoenix Contact devices using CodeMeter embedded are not affected by these vulnerabilities.
Temporary Fix / Mitigation
Remediation
PHOENIX CONTACT strongly recommends affected Users to upgrade to Codemeter V7.21a, which fixes these vulnerabilities. Wibu-Systems has already published this update for CodeMeter on their homepage. Since this current version of CodeMeter V7.21a has not yet been incorporated into Phoenix Contact products, we strongly recommend to download and install the current CodeMeter version directly from the Wibu-Systems homepage.
This vulnerability was discovered and reported to WIBU Systems by Tenable.
We kindly appreciate the coordinated disclosure of this vulnerability by the finder.
PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication.