No analysis available yet.
Vendor Solution
Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0 LTS or higher which fixes these vulnerabilities.
Vendor Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4821 | On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2020-049 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:21:36.619Z
Reserved: 2020-04-30T00:00:00.000Z
Link: CVE-2020-12519
No data.
Status : Modified
Published: 2020-12-17T23:15:13.060
Modified: 2024-11-21T04:59:51.313
Link: CVE-2020-12519
No data.
OpenCVE Enrichment
No data.
EUVD