No analysis available yet.
Vendor Solution
Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0 LTS or higher which fixes these vulnerabilities.
Vendor Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4820 | On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2020-049 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:50:39.329Z
Reserved: 2020-04-30T00:00:00.000Z
Link: CVE-2020-12518
No data.
Status : Modified
Published: 2020-12-17T23:15:12.983
Modified: 2024-11-21T04:59:51.163
Link: CVE-2020-12518
No data.
OpenCVE Enrichment
No data.
EUVD