An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-19-579/ | vdb entry third party advisory |
https://cert.vde.com/en-us/advisories/vde-2019-014 | third party advisory |