mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2020-12498 | 5 Feb 202516:22 | – | redhatcve |
![]() | Input validation | 1 Jul 202016:15 | – | prion |
![]() | CVE-2020-12498 | 1 Jul 202016:15 | – | nvd |
![]() | Phoenix Contact Automationworx PC WORX MWE File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability | 10 Jul 202000:00 | – | zdi |
![]() | CVE-2020-12498 Phoenix Contact Automation Worx <= 1.87: out-of-bounds read remote code execution | 1 Jul 202015:52 | – | cvelist |
![]() | Phoenix Contact Automation Worx Software Suite | 9 Jul 202000:00 | – | ics |
[
{
"product": "Automation Worx",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "1.87",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Automation Worx Express",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "1.87",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
cert | www.cert.vde.com/de-de/advisories/vde-2020-023 |
zerodayinitiative | www.zerodayinitiative.com/advisories/ZDI-20-826/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo