Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-16675

Опубликовано: 31 окт. 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 6.8
EPSS Низкий

Описание

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:phoenixcontact:config\+:*:*:*:*:*:*:*:*
Версия до 1.86 (включая)
cpe:2.3:a:phoenixcontact:pc_worx:*:*:*:*:*:*:*:*
Версия до 1.86 (включая)
cpe:2.3:a:phoenixcontact:pc_worx_express:*:*:*:*:*:*:*:*
Версия до 1.86 (включая)

EPSS

Процентиль: 91%
0.07002
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-125

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.

EPSS

Процентиль: 91%
0.07002
Низкий

7.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-125