CVE-2019-16675
Summary
| CVE | CVE-2019-16675 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-10-31 22:15:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation. |
Risk And Classification
Problem Types: CWE-125
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Phoenixcontact | Config | All | All | All | All |
| Application | Phoenixcontact | Config | All | All | All | All |
| Application | Phoenixcontact | Pc Worx | All | All | All | All |
| Application | Phoenixcontact | Pc Worx Express | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| PHOENIX CONTACT Automation Worx Software Suite | CISA | MISC | www.us-cert.gov | Third Party Advisory, US Government Resource |
| Advisories — English (USA) | MISC | cert.vde.com | Third Party Advisory |
| ZDI-19-991 | Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| ZDI-19-922 | Zero Day Initiative | MISC | www.zerodayinitiative.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.