Discover details of CVE-2023-46143 impacting PHOENIX CONTACT classic line PLCs. Learn about the Download of Code Without Integrity Check vulnerability and its high severity impact.
This CVE-2023-46143 article provides insight into a vulnerability impacting PHOENIX CONTACT classic line PLCs allowing unauthorized attackers to modify applications remotely.
Understanding CVE-2023-46143
This section dives into the details of the CVE-2023-46143 vulnerability.
What is CVE-2023-46143?
The Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs permits unauthenticated remote attackers to modify applications on a PLC.
The Impact of CVE-2023-46143
The vulnerability poses a high integrity impact, with a CVSS base score of 7.5, making it a critical threat to affected systems.
Technical Details of CVE-2023-46143
Explore the technical aspects of the CVE-2023-46143 vulnerability in this section.
Vulnerability Description
The vulnerability allows remote attackers to download code without integrity checks, enabling unauthorized modification of PLC applications.
Affected Systems and Versions
PHOENIX CONTACT industrial controllers including Automation Worx Software Suite, AXC series, ILC series, PC Worx, PC Worx Express, and more are affected.
Exploitation Mechanism
Attackers can exploit this vulnerability remotely without the need for privileges, with a low attack complexity and network-based attack vector.
Mitigation and Prevention
Discover how to mitigate and prevent CVE-2023-46143 in this section.
Immediate Steps to Take
Immediately implement security measures such as restricting network access, applying access controls, and monitoring system integrity.
Long-Term Security Practices
To enhance long-term security, regularly update and patch the affected systems, conduct security audits, and train personnel on cybersecurity best practices.
Patching and Updates
Stay informed about security patches released by PHOENIX CONTACT and promptly apply them to mitigate the vulnerability.