AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
Home›Brands›Phoenix Contact
PH
Platform

Phoenix Contact

PLCnext Technology, AXC F PLCs, FL SWITCH Ethernet, and comprehensive ICS cybersecurity portfolio.

https://www.phoenixcontact.com →
85
Total CVEs
0
Resources
12
CRIT
54
HIGH
18
MED
1
LOW
CVEsCVEsSpecsTech SpecsDocsTech DocsImplImplementationsExamplesExamples
54 / 85
CVE-2014-9195HIGH

Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.

Jan 17, 2015
10.0
CVE-2023-37861HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a certificate to the device.

Aug 9, 2023
8.8
CVE-2023-3573HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.

Aug 8, 2023
8.8
CVE-2023-3571HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP POST releated to certificate operations to gain full access to the device.

Aug 8, 2023
8.8
CVE-2023-3570HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device.

Aug 8, 2023
8.8
CVE-2023-1109HIGH

In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.

Apr 17, 2023
8.8
CVE-2022-22509HIGH

In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.

Feb 2, 2022
8.8
CVE-2020-12519HIGH

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.

Dec 17, 2020
8.8
CVE-2020-12517HIGH

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).

Dec 17, 2020
8.8
CVE-2020-9436HIGH

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.

Mar 12, 2020
8.8
CVE-2019-12870HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Uninitialized Pointer and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2019-12869HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2019-12871HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2018-13993HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.

May 7, 2019
8.8
CVE-2019-9744HIGH

An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.

Mar 26, 2019
8.8
CVE-2019-9743HIGH

An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command injection can occur in the WebHMI component.

Mar 26, 2019
8.8
CVE-2018-13990HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.

May 6, 2019
8.6
CVE-2023-37862HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-connections and might result in a partial denial-of-service.

Aug 9, 2023
8.2
CVE-2020-12499HIGH

In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files.

Jul 21, 2020
8.2
CVE-2019-18352HIGH

Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2GC-2SFP devices before V2.90 when using MAC-based port security.

Feb 18, 2020
8.2
CVE-2018-13992HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.

May 7, 2019
8.2
CVE-2018-10728HIGH

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).

May 17, 2018
8.1
CVE-2022-3737HIGH

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

Nov 15, 2022
7.8
CVE-2022-3461HIGH

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

Nov 15, 2022
7.8
CVE-2021-34597HIGH

Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.

Nov 4, 2021
7.8
CVE-2021-33542HIGH

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

Jun 25, 2021
7.8
CVE-2020-12498HIGH

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

Jul 1, 2020
7.8
CVE-2020-12497HIGH

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

Jul 1, 2020
7.8
CVE-2020-10940HIGH

Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.

Mar 27, 2020
7.8
CVE-2020-10939HIGH

Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.

Mar 27, 2020
7.8
CVE-2019-16675HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.

Oct 31, 2019
7.8
CVE-2018-5441HIGH

An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.

Jan 30, 2018
7.8
CVE-2023-5592HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.

Dec 14, 2023
7.5
CVE-2023-46143HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

Dec 14, 2023
7.5
CVE-2023-37860HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.

Aug 9, 2023
7.5
CVE-2022-3480HIGH

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.

Nov 15, 2022
7.5
CVE-2021-34579HIGH

In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.

Nov 9, 2022
7.5
CVE-2021-34598HIGH

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active

Nov 10, 2021
7.5
CVE-2021-34570HIGH

Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.

Sep 27, 2021
7.5
CVE-2021-33541HIGH

Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected.

Jun 25, 2021
7.5
CVE-2021-21005HIGH

In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.

Jun 25, 2021
7.5
CVE-2021-21002HIGH

In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead to a temporary denial of service.

Jun 25, 2021
7.5
CVE-2020-12524HIGH

Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).

Dec 2, 2020
7.5
CVE-2020-9435HIGH

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certificate during installation.

Mar 12, 2020
7.5
CVE-2018-13994HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.

May 7, 2019
7.5
CVE-2017-7935HIGH

A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may compromise the device's availability by performing multiple initial VPN requests.

May 19, 2017
7.5
CVE-2021-21004HIGH

In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client.

Jun 25, 2021
7.4
CVE-2021-33540HIGH

In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists.

Jun 25, 2021
7.3
CVE-2016-8380HIGH

The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication.

Apr 5, 2018
7.3
CVE-2016-8371HIGH

The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authentication mechanism is enabled.

Apr 5, 2018
7.3
CVE-2016-8366HIGH

Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by the user. The password macro can be configured in a way that the password is stored and transferred in clear text.

Apr 5, 2018
7.3
CVE-2023-37864HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Aug 9, 2023
7.2
CVE-2023-37863HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Aug 9, 2023
7.2
CVE-2023-37859HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

Aug 9, 2023
7.2
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2014-9195HIGH
10.0
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers …Jan 17, 2015›
CVE-2023-37861HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote at…Aug 9, 2023›
CVE-2023-3573HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2023-3571HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2023-3570HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2023-1109HIGH
8.8
In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend c…Apr 17, 2023›
CVE-2022-22509HIGH
8.8
In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an…Feb 2, 2022›
CVE-2020-12519HIGH
8.8
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulne…Dec 17, 2020›
CVE-2020-12517HIGH
8.8
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privilege…Dec 17, 2020›
CVE-2020-9436HIGH
8.8
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002…Mar 12, 2020›
CVE-2019-12870HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2019-12869HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2019-12871HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2018-13993HIGH
8.8
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.May 7, 2019›
CVE-2019-9744HIGH
8.8
An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL…Mar 26, 2019›
CVE-2019-9743HIGH
8.8
An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command inj…Mar 26, 2019›
CVE-2018-13990HIGH
8.6
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brut…May 6, 2019›
CVE-2023-37862HIGH
8.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote …Aug 9, 2023›
CVE-2020-12499HIGH
8.2
In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnera…Jul 21, 2020›
CVE-2019-18352HIGH
8.2
Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2…Feb 18, 2020›
CVE-2018-13992HIGH
8.2
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext tr…May 7, 2019›
CVE-2018-10728HIGH
8.1
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33…May 17, 2018›
CVE-2022-3737HIGH
7.8
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the in…Nov 15, 2022›
CVE-2022-3461HIGH
7.8
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ f…Nov 15, 2022›
CVE-2021-34597HIGH
7.8
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version…Nov 4, 2021›
CVE-2021-33542HIGH
7.8
Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a re…Jun 25, 2021›
CVE-2020-12498HIGH
7.8
mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerab…Jul 1, 2020›
CVE-2020-12497HIGH
7.8
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can…Jul 1, 2020›
CVE-2020-10940HIGH
7.8
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed …Mar 27, 2020›
CVE-2020-10939HIGH
7.8
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privi…Mar 27, 2020›
CVE-2019-16675HIGH
7.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Oct 31, 2019›
CVE-2018-5441HIGH
7.8
An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmw…Jan 30, 2018›
CVE-2023-5592HIGH
7.5
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT…Dec 14, 2023›
CVE-2023-46143HIGH
7.5
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows a…Dec 14, 2023›
CVE-2023-37860HIGH
7.5
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated a…Aug 9, 2023›
CVE-2022-3480HIGH
7.5
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and …Nov 15, 2022›
CVE-2021-34579HIGH
7.5
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being ins…Nov 9, 2022›
CVE-2021-34598HIGH
7.5
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging fun…Nov 10, 2021›
CVE-2021-34570HIGH
7.5
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a Do…Sep 27, 2021›
CVE-2021-33541HIGH
7.5
Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by …Jun 25, 2021›
CVE-2021-21005HIGH
7.5
In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-c…Jun 25, 2021›
CVE-2021-21002HIGH
7.5
In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead …Jun 25, 2021›
CVE-2020-12524HIGH
7.5
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP …Dec 2, 2020›
CVE-2020-9435HIGH
7.5
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002…Mar 12, 2020›
CVE-2018-13994HIGH
7.5
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a deni…May 7, 2019›
CVE-2017-7935HIGH
7.5
A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to…May 19, 2017›
CVE-2021-21004HIGH
7.4
In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malici…Jun 25, 2021›
CVE-2021-33540HIGH
7.3
In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented passwo…Jun 25, 2021›
CVE-2016-8380HIGH
7.3
The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without aut…Apr 5, 2018›
CVE-2016-8371HIGH
7.3
The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authen…Apr 5, 2018›
CVE-2016-8366HIGH
7.3
Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against…Apr 5, 2018›
CVE-2023-37864HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNM…Aug 9, 2023›
CVE-2023-37863HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNM…Aug 9, 2023›
CVE-2023-37859HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running…Aug 9, 2023›