An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-06-24T14:57:47
Updated: 2024-08-04T23:32:55.585Z
Reserved: 2019-06-18T00:00:00
Link: CVE-2019-12871
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-06-24T15:15:10.173
Modified: 2024-11-21T04:23:44.867
Link: CVE-2019-12871
Redhat
No data.