An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-06-24T14:57:47

Updated: 2019-06-24T14:57:47

Reserved: 2019-06-18T00:00:00


Link: CVE-2019-12871

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-06-24T15:15:10.173

Modified: 2019-06-27T16:33:08.253


Link: CVE-2019-12871

JSON object: View

cve-icon Redhat Information

No data.

CWE