Required CVE Record Information
Description
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
7.5 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
Product Status
Learn moreVersions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Credits
- Reid Wightman of Dragos, Inc. reporter
References 1 Total
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 1 Total
- https://cert.vde.com/en/advisories/VDE-2023-057/ x_transferred