Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-46143 : Security Advisory and Response

Discover details of CVE-2023-46143 impacting PHOENIX CONTACT classic line PLCs. Learn about the Download of Code Without Integrity Check vulnerability and its high severity impact.

This CVE-2023-46143 article provides insight into a vulnerability impacting PHOENIX CONTACT classic line PLCs allowing unauthorized attackers to modify applications remotely.

Understanding CVE-2023-46143

This section dives into the details of the CVE-2023-46143 vulnerability.

What is CVE-2023-46143?

The Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs permits unauthenticated remote attackers to modify applications on a PLC.

The Impact of CVE-2023-46143

The vulnerability poses a high integrity impact, with a CVSS base score of 7.5, making it a critical threat to affected systems.

Technical Details of CVE-2023-46143

Explore the technical aspects of the CVE-2023-46143 vulnerability in this section.

Vulnerability Description

The vulnerability allows remote attackers to download code without integrity checks, enabling unauthorized modification of PLC applications.

Affected Systems and Versions

PHOENIX CONTACT industrial controllers including Automation Worx Software Suite, AXC series, ILC series, PC Worx, PC Worx Express, and more are affected.

Exploitation Mechanism

Attackers can exploit this vulnerability remotely without the need for privileges, with a low attack complexity and network-based attack vector.

Mitigation and Prevention

Discover how to mitigate and prevent CVE-2023-46143 in this section.

Immediate Steps to Take

Immediately implement security measures such as restricting network access, applying access controls, and monitoring system integrity.

Long-Term Security Practices

To enhance long-term security, regularly update and patch the affected systems, conduct security audits, and train personnel on cybersecurity best practices.

Patching and Updates

Stay informed about security patches released by PHOENIX CONTACT and promptly apply them to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now