PHOENIX CONTACT AXC F 3152

CPE Details

PHOENIX CONTACT AXC F 3152
-
2020-12-18
14h51 +00:00
2021-04-13
16h40 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:phoenixcontact:axc_f_3152:-:*:*:*:*:*:*:*

Informations

Vendor

phoenixcontact

Product

axc_f_3152

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-46144 2023-12-14 14h08 +00:00 A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices.
6.5
Moyen
CVE-2023-46142 2023-12-14 14h05 +00:00 A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.
8.8
Haute
CVE-2021-34570 2021-09-27 08h25 +00:00 Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
7.5
Haute
CVE-2020-12521 2020-12-17 22h43 +00:00 On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.
6.5
Moyen
CVE-2020-12519 2020-12-17 22h43 +00:00 On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.
9.8
Critique
CVE-2020-12518 2020-12-17 22h43 +00:00 On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.
5.5
Moyen
CVE-2020-12517 2020-12-17 22h43 +00:00 On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).
9
Critique