Learn about CVE-2023-46141 affecting PHOENIX CONTACT classic line products, allowing remote attackers to gain full device access. Critical severity with a CVSS score of 9.8.
Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource
Understanding CVE-2023-46141
This CVE identifies a critical vulnerability in multiple products of the PHOENIX CONTACT classic line, allowing a remote unauthenticated attacker to gain full access to the affected device.
What is CVE-2023-46141?
The CVE-2023-46141 vulnerability involves an Incorrect Permission Assignment for Critical Resource in various PHOENIX CONTACT products. It enables an attacker to exploit the flaw remotely without authentication, leading to unauthorized access to the affected device.
The Impact of CVE-2023-46141
With a CVSS v3.1 base severity score of 9.8 (Critical), this vulnerability has a significant impact. Attackers can exploit this flaw over the network, with high confidentiality, integrity, and availability impact, thereby gaining full control over the affected device.
Technical Details of CVE-2023-46141
This section delves into the specific technical details of the CVE vulnerability to provide a comprehensive understanding of its implications.
Vulnerability Description
The vulnerability arises due to an incorrect permission assignment for a critical resource in PHOENIX CONTACT classic line products. Attackers can exploit this flaw remotely, without the need for any authentication, allowing them to take complete control of the affected device.
Affected Systems and Versions
The vulnerability impacts various products under the PHOENIX CONTACT classic line, including Automation Worx Software Suite, AXC series, Config+, FC series, ILC series, PC Worx series, and more.
Exploitation Mechanism
The vulnerability can be exploited remotely over the network by an unauthenticated attacker. By leveraging the incorrect permission assignment for a critical resource, the attacker can escalate privileges and gain full access to the targeted device.
Mitigation and Prevention
To address CVE-2023-46141 and enhance the security of affected systems, organizations must take immediate and proactive measures to mitigate the risks posed by this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security advisories and updates from PHOENIX CONTACT to apply patches promptly and ensure the ongoing protection of your systems.