Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-12518 : Security Advisory and Response

Learn about CVE-2020-12518 affecting Phoenix Contact PLCnext Control Devices before 2021.0 LTS. Find out the impact, affected systems, and mitigation steps.

Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS have a vulnerability that allows attackers to gain sensitive information.

Understanding CVE-2020-12518

This CVE involves Phoenix Contact PLCnext Control Devices and the potential risks associated with pre-2021.0 LTS versions.

What is CVE-2020-12518?

This CVE refers to a security flaw in Phoenix Contact PLCnext Control Devices before the 2021.0 LTS version. Attackers can exploit this vulnerability to access sensitive information, potentially leading to further attacks.

The Impact of CVE-2020-12518

The vulnerability allows attackers to read insufficiently protected sensitive information, enabling them to plan and execute additional attacks on affected systems.

Technical Details of CVE-2020-12518

Phoenix Contact PLCnext Control Devices are affected by this vulnerability, with specific details outlined below.

Vulnerability Description

The flaw allows attackers to leverage unprotected sensitive data to strategize and carry out subsequent attacks on the system.

Affected Systems and Versions

        AXC F 1152 (1151412)
        AXC F 2152 (2404267)
        AXC F 3152 (1069208)
        RFC 4072S (1051328)
        AXC F 2152 Starterkit (1046568)
        PLCnext Technology Starterkit (1188165)

Exploitation Mechanism

        Attack Complexity: Low
        Attack Vector: Local
        Confidentiality Impact: High
        Privileges Required: Low
        User Interaction: None
        CVSS Base Score: 5.5 (Medium)

Mitigation and Prevention

To address CVE-2020-12518, users should take immediate and long-term security measures.

Immediate Steps to Take

        Upgrade to Firmware 2021.0 LTS or higher as recommended by Phoenix Contact.
        Operate network-capable devices in closed networks or behind a suitable firewall.

Long-Term Security Practices

        Regularly update firmware and software to patch vulnerabilities.
        Implement network segmentation and access controls to limit exposure.

Patching and Updates

Ensure all devices are running the latest firmware version to mitigate the risks associated with this vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now