Description
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Published: 2022-11-15
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade to Automation Worx Software Suite > 1.89

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-43093 In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
History

Mon, 28 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Phoenixcontact Automationworx Software Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-04-28T20:18:28.564Z

Reserved: 2022-10-28T07:16:41.383Z

Link: CVE-2022-3737

cve-icon Vulnrichment

Updated: 2024-08-03T01:20:57.710Z

cve-icon NVD

Status : Modified

Published: 2022-11-15T11:15:12.457

Modified: 2024-11-21T07:20:08.370

Link: CVE-2022-3737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses