CVE-2021-33542
📋 TL;DR
This vulnerability allows remote code execution on Phoenix Contact Classic Automation Worx Software Suite programming workstations. Attackers can manipulate bus configuration files (*.bcp) to trigger memory corruption when unallocated memory is freed. Only application programming workstations running affected software versions are vulnerable; automated systems in operation are not affected.
💻 Affected Systems
- Phoenix Contact Classic Automation Worx Software Suite
📦 What is this software?
Config\+ by Phoenixcontact
Pc Worx by Phoenixcontact
Pc Worx Express by Phoenixcontact
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of programming workstation allowing attacker to execute arbitrary code, potentially gaining full control over the system, modifying PLC programs, or establishing persistence in industrial control environments.
Likely Case
Attacker with access to original configuration files could manipulate them to execute malicious code on programming workstations, potentially compromising project integrity or stealing intellectual property.
If Mitigated
With proper file integrity monitoring and access controls, exploitation would require bypassing multiple security layers, limiting impact to isolated incidents.
🎯 Exploit Status
Exploitation requires: 1) Access to original *.bcp configuration files, 2) Ability to manipulate these files, 3) Ability to replace manipulated files on target programming workstation. This multi-step process increases complexity.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version above 1.87
Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-020
Restart Required: Yes
Instructions:
1. Download latest version from Phoenix Contact support portal. 2. Backup existing projects and configurations. 3. Uninstall affected version. 4. Install patched version. 5. Restart system. 6. Verify installation and restore backups if needed.
🔧 Temporary Workarounds
Restrict access to configuration files
windowsImplement strict access controls on *.bcp files to prevent unauthorized modification or replacement.
Implement file integrity monitoring
allMonitor *.bcp files for unauthorized changes using file integrity monitoring solutions.
🧯 If You Can't Patch
- Isolate programming workstations on separate network segments with strict access controls
- Implement application whitelisting to prevent execution of unauthorized code on affected systems
🔍 How to Verify
Check if Vulnerable:
Check software version in Help > About menu. If version is 1.87 or below, system is vulnerable.
Check Version:
Check via GUI: Help > About in PC Worx or Config+ software
Verify Fix Applied:
Verify installed version is above 1.87 in Help > About menu. Test with known safe *.bcp files to ensure proper functionality.
📡 Detection & Monitoring
Log Indicators:
- Unexpected application crashes when loading *.bcp files
- Unauthorized file modifications to *.bcp files
- Unusual process execution from PC Worx/Config+ applications
Network Indicators:
- Unusual file transfers involving *.bcp files
- Network connections from programming workstations to unexpected destinations
SIEM Query:
source="windows-security" EventCode=4688 AND (NewProcessName="*PCWorx*" OR NewProcessName="*Config+*") AND ParentProcessName!="explorer.exe"