VDE-2022-048
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2022-11-15 09:25 - Updated: 2025-05-14 13:00Summary
PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities
Notes
Summary: Manipulated PC Worx or Config+ files could lead to a heap buffer overflow, release of unallocated memory or a read access violation due to insufficient validation of input data.The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation.
Update A, 2022-11-14
removed the sentence "Automated systems in operation which were programmed with one of the above-mentioned products are not affected." from Impact.
Impact: Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Mitigation: We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.
Remediation: With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.
We strongly recommend customers to upgrade to Automation Worx Software Suite > 1.89.
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
7.8 (High)
Mitigation
We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.
Vendor Fix
With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.
We strongly recommend customers to upgrade to Automation Worx Software Suite > 1.89.
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
7.8 (High)
Mitigation
We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.
Vendor Fix
With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.
We strongly recommend customers to upgrade to Automation Worx Software Suite > 1.89.
References
Acknowledgments
CERT@VDE
Michael Heinzl
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination"
},
{
"organization": "Michael Heinzl",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Manipulated PC Worx or Config+ files could lead to a heap buffer overflow, release of unallocated memory or a read access violation due to insufficient validation of input data.The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation.\n\n\nUpdate A, 2022-11-14\n\nremoved the sentence \"Automated systems in operation which were programmed with one of the above-mentioned products are not affected.\" from Impact.",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.",
"title": "Impact"
},
{
"category": "description",
"text": "We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.",
"title": "Mitigation"
},
{
"category": "description",
"text": "With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.\nWe strongly recommend customers to upgrade to Automation Worx Software Suite \u003e 1.89.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT PSIRT ",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2022-048: PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-048/"
},
{
"category": "self",
"summary": "VDE-2022-048: PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-048.json"
}
],
"title": "PHOENIX CONTACT: Automationworx BCP File Parsing Vulnerabilities",
"tracking": {
"aliases": [
"VDE-2022-048"
],
"current_release_date": "2025-05-14T13:00:15.000Z",
"generator": {
"date": "2025-04-09T09:10:26.409Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.18"
}
},
"id": "VDE-2022-048",
"initial_release_date": "2022-11-15T09:25:00.000Z",
"revision_history": [
{
"date": "2022-11-15T09:25:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2022-11-15T09:26:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-05-14T13:00:15.000Z",
"number": "3",
"summary": "Fix: added distribution"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "1.0\u003c=1.89",
"product": {
"name": "Config+ 1.0\u003c=1.89",
"product_id": "CSAFPID-51001"
}
},
{
"category": "product_version",
"name": "1.90",
"product": {
"name": "Config+ 1.90",
"product_id": "CSAFPID-52001"
}
}
],
"category": "product_name",
"name": "Config+"
},
{
"branches": [
{
"category": "product_version_range",
"name": "1.0\u003c=1.89",
"product": {
"name": "PC Worx 1.0\u003c=1.89",
"product_id": "CSAFPID-51002"
}
},
{
"category": "product_version",
"name": "1.90",
"product": {
"name": "PC Worx 1.90",
"product_id": "CSAFPID-52002"
}
}
],
"category": "product_name",
"name": "PC Worx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "1.0\u003c=1.89",
"product": {
"name": "PC Worx Express 1.0\u003c=1.89",
"product_id": "CSAFPID-51003"
}
},
{
"category": "product_version",
"name": "1.90",
"product": {
"name": "PC Worx Express 1.90",
"product_id": "CSAFPID-52003"
}
}
],
"category": "product_name",
"name": "PC Worx Express"
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "Phoenix Contact"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003"
],
"summary": "Affected Products"
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-52001",
"CSAFPID-52002",
"CSAFPID-52003"
],
"summary": "Fixed Products"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3461",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "description",
"text": "In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-52001",
"CSAFPID-52002",
"CSAFPID-52003"
],
"known_affected": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.\nWe strongly recommend customers to upgrade to Automation Worx Software Suite \u003e 1.89.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003"
]
}
],
"title": "CVE-2022-3461"
},
{
"cve": "CVE-2022-3737",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "description",
"text": "In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-52001",
"CSAFPID-52002",
"CSAFPID-52003"
],
"known_affected": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003"
]
},
"remediations": [
{
"category": "mitigation",
"details": "We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "With the next version of Automationworx Software Suite an already implemented remediation measure needs to be corrected to prevent the release of unallocated memory.To prevent the read access violation the validation of the input data will be improved.\nWe strongly recommend customers to upgrade to Automation Worx Software Suite \u003e 1.89.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003"
]
}
],
"title": "CVE-2022-3737"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…