ID

VAR-202007-0239


CVE

CVE-2020-12498


TITLE

Phoenix Contact PC Worx and PC Worx Express Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-007565

DESCRIPTION

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation. (DoS) It may be put into a state. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Phoenix Contact Automationworx. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of MWE files by the PC WORX and PC WORX Express executables. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Phoenix Contact PC Worx and Phoenix Contact PC Worx Express are both a set of programming software for PLC (programmable logic controller) of Phoenix Contact (Germany Phoenix Contact)

Trust: 2.79

sources: NVD: CVE-2020-12498 // JVNDB: JVNDB-2020-007565 // ZDI: ZDI-20-826 // CNVD: CNVD-2020-38415

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-38415

AFFECTED PRODUCTS

vendor:phoenixcontactmodel:pc worxscope:ltversion:1.87

Trust: 1.0

vendor:phoenixcontactmodel:pc worx expressscope:lteversion:1.87

Trust: 1.0

vendor:phoenix contactmodel:pc worxscope:eqversion:1.87

Trust: 0.8

vendor:phoenix contactmodel:pc worx expressscope:eqversion:1.87

Trust: 0.8

vendor:phoenix contactmodel:automationworxscope: - version: -

Trust: 0.7

vendor:phoenixmodel:contact pc worxscope:lteversion:<=1.87

Trust: 0.6

vendor:phoenixmodel:contact pc worx expressscope:lteversion:<=1.87

Trust: 0.6

sources: ZDI: ZDI-20-826 // CNVD: CNVD-2020-38415 // JVNDB: JVNDB-2020-007565 // NVD: CVE-2020-12498

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12498
value: HIGH

Trust: 1.0

info@cert.vde.com: CVE-2020-12498
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-007565
value: HIGH

Trust: 0.8

ZDI: CVE-2020-12498
value: HIGH

Trust: 0.7

CNVD: CNVD-2020-38415
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202007-073
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-12498
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-007565
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-38415
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-12498
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: JVNDB-2020-007565
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-12498
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-826 // CNVD: CNVD-2020-38415 // JVNDB: JVNDB-2020-007565 // CNNVD: CNNVD-202007-073 // NVD: CVE-2020-12498 // NVD: CVE-2020-12498

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.8

problemtype:CWE-121

Trust: 1.0

sources: JVNDB: JVNDB-2020-007565 // NVD: CVE-2020-12498

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202007-073

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202007-073

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-007565

PATCH

title:Top Pageurl:https://www.phoenixcontact.com/online/portal/pi?1dmy&urile=wcm%3apath%3a/pien/web/home

Trust: 0.8

title:Phoenix Contact has issued an update to correct this vulnerability.url:https://us-cert.cisa.gov/ics/advisories/icsa-20-191-01

Trust: 0.7

sources: ZDI: ZDI-20-826 // JVNDB: JVNDB-2020-007565

EXTERNAL IDS

db:NVDid:CVE-2020-12498

Trust: 3.7

db:CERT@VDEid:VDE-2020-023

Trust: 2.4

db:ZDIid:ZDI-20-826

Trust: 2.3

db:ICS CERTid:ICSA-20-191-01

Trust: 1.4

db:JVNid:JVNVU97113078

Trust: 0.8

db:JVNDBid:JVNDB-2020-007565

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-10586

Trust: 0.7

db:CNVDid:CNVD-2020-38415

Trust: 0.6

db:NSFOCUSid:47403

Trust: 0.6

db:NSFOCUSid:47078

Trust: 0.6

db:AUSCERTid:ESB-2020.2365

Trust: 0.6

db:CNNVDid:CNNVD-202007-073

Trust: 0.6

sources: ZDI: ZDI-20-826 // CNVD: CNVD-2020-38415 // JVNDB: JVNDB-2020-007565 // CNNVD: CNNVD-202007-073 // NVD: CVE-2020-12498

REFERENCES

url:https://cert.vde.com/de-de/advisories/vde-2020-023

Trust: 2.4

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-191-01

Trust: 2.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12498

Trust: 2.0

url:https://www.zerodayinitiative.com/advisories/zdi-20-826/

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-12498

Trust: 0.8

url:https://jvn.jp/vu/jvnvu97113078/

Trust: 0.8

url:http://www.nsfocus.net/vulndb/47403

Trust: 0.6

url:http://www.nsfocus.net/vulndb/47078

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2365/

Trust: 0.6

sources: ZDI: ZDI-20-826 // CNVD: CNVD-2020-38415 // JVNDB: JVNDB-2020-007565 // CNNVD: CNNVD-202007-073 // NVD: CVE-2020-12498

CREDITS

mdm

Trust: 0.7

sources: ZDI: ZDI-20-826

SOURCES

db:ZDIid:ZDI-20-826
db:CNVDid:CNVD-2020-38415
db:JVNDBid:JVNDB-2020-007565
db:CNNVDid:CNNVD-202007-073
db:NVDid:CVE-2020-12498

LAST UPDATE DATE

2024-11-23T22:05:29.433000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-826date:2020-07-10T00:00:00
db:CNVDid:CNVD-2020-38415date:2020-07-13T00:00:00
db:JVNDBid:JVNDB-2020-007565date:2020-08-17T00:00:00
db:CNNVDid:CNNVD-202007-073date:2020-08-05T00:00:00
db:NVDid:CVE-2020-12498date:2024-11-21T04:59:48.397

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-826date:2020-07-10T00:00:00
db:CNVDid:CNVD-2020-38415date:2020-07-13T00:00:00
db:JVNDBid:JVNDB-2020-007565date:2020-08-17T00:00:00
db:CNNVDid:CNNVD-202007-073date:2020-07-01T00:00:00
db:NVDid:CVE-2020-12498date:2020-07-01T16:15:12.963