Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4800 | mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. |
Solution
With the next version of Automation Worx Software Suite (Version > 1.87) a sharpened input data validation with respect to buffer size and description of size and number of objects referenced in a file will be implemented.
Workaround
We strongly recommend customers to exchange project files only using secure file exchange services. Project files should not be exchanged via unencrypted email. In addition, we recommend exchanging or storing project files together with a checksum to ensure their integrity.
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-08-04T11:56:52.080Z
Reserved: 2020-04-30T00:00:00
Link: CVE-2020-12498
No data.
Status : Modified
Published: 2020-07-01T16:15:12.963
Modified: 2024-11-21T04:59:48.397
Link: CVE-2020-12498
No data.
OpenCVE Enrichment
No data.
EUVD