In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43093 | In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. |
Fixes
Solution
Upgrade to Automation Worx Software Suite > 1.89
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2022-048/ |
|
History
Mon, 28 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-04-28T20:18:28.564Z
Reserved: 2022-10-28T07:16:41.383Z
Link: CVE-2022-3737
Updated: 2024-08-03T01:20:57.710Z
Status : Modified
Published: 2022-11-15T11:15:12.457
Modified: 2024-11-21T07:20:08.370
Link: CVE-2022-3737
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD