Описание
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
Ссылки
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 1.87 (исключая)Версия до 1.87 (включая)
Одно из
cpe:2.3:a:phoenixcontact:pc_worx:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:pc_worx_express:*:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08365
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-121
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
CVSS3: 7.3
fstec
больше 5 лет назад
Уязвимость компонентов PC Worx, PC Worx Express программного пакета Automationworx Software Suite, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 92%
0.08365
Низкий
7.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-121
CWE-787