|Article No°||Product Name||Affected Version(s)|
|-||Config+||1.0 <= 1.89|
|-||PC Worx||1.0 <= 1.89|
|-||PC Worx Express||1.0 <= 1.89|
Manipulated PC Worx or Config+ files could lead to a heap buffer overflow, release of unallocated memory or a read access violation due to insufficient validation of input data.
The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation.
Update A, 2022-11-14
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.
With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.
To prevent the read access violation the validation of the input data will be improved.
We strongly recommend customers to upgrade to Automation Worx Software Suite > 1.89.
This vulnerability was discovered by Michael Heinzl.
We kindly appreciate the coordinated disclosure of this vulnerability by the finder.
PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication.