An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-24T14:57:47

Updated: 2024-08-04T23:32:55.585Z

Reserved: 2019-06-18T00:00:00

Link: CVE-2019-12871

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-06-24T15:15:10.173

Modified: 2024-11-21T04:23:44.867

Link: CVE-2019-12871

cve-icon Redhat

No data.