In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

Project Subscriptions

Vendors Products
Phoenixcontact Subscribe
Automationworx Software Suite Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-42833 In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Fixes

Solution

Upgrade to Automation Worx Software Suite > 1.89


Workaround

No workaround given by the vendor.

History

Tue, 29 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-04-29T20:13:09.642Z

Reserved: 2022-10-12T05:45:11.921Z

Link: CVE-2022-3461

cve-icon Vulnrichment

Updated: 2024-08-03T01:07:06.698Z

cve-icon NVD

Status : Modified

Published: 2022-11-15T11:15:10.917

Modified: 2024-11-21T07:19:34.340

Link: CVE-2022-3461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses