An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Uninitialized Pointer and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
The product accesses or uses a pointer that has not been initialized.
Link | Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-19-575/ | vdb entry third party advisory |
https://cert.vde.com/en-us/advisories/vde-2019-014 | third party advisory |