CVE-2023-46143

7.5 HIGH

📋 TL;DR

CVE-2023-46143 is a critical vulnerability in PHOENIX CONTACT classic line PLCs that allows unauthenticated remote attackers to download and modify applications on affected programmable logic controllers. This affects industrial control systems using these specific PLCs, potentially compromising manufacturing, infrastructure, and other operational technology environments.

💻 Affected Systems

Products:
  • PHOENIX CONTACT classic line PLCs
Versions: All versions prior to patched firmware
Operating Systems: PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects classic line PLCs specifically; requires network access to PLC programming port.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of industrial processes, physical damage to equipment, production shutdowns, safety system compromise leading to potential injuries or environmental harm.

🟠

Likely Case

Unauthorized modification of PLC logic causing production disruptions, quality issues, or operational anomalies without physical damage.

🟢

If Mitigated

Limited impact due to network segmentation and access controls preventing external attackers from reaching PLCs.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows direct attacks from internet if PLCs are exposed.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any compromised internal system can attack PLCs.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows direct code download/modification without authentication; exploitation appears straightforward based on advisory description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2023-057/

Restart Required: Yes

Instructions:

1. Download latest firmware from PHOENIX CONTACT support portal. 2. Backup current PLC configuration. 3. Upload new firmware using PC Worx engineering software. 4. Restore configuration. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs from untrusted networks using firewalls and VLANs

Access Control Lists

all

Restrict access to PLC programming ports (TCP 1962 typically) to authorized engineering stations only

🧯 If You Can't Patch

  • Implement strict network segmentation with industrial firewalls
  • Deploy intrusion detection systems monitoring for unauthorized PLC programming traffic

🔍 How to Verify

Check if Vulnerable:

Check PLC firmware version against vendor advisory; if using classic line PLCs with unpatched firmware, assume vulnerable.

Check Version:

Use PC Worx engineering software to read PLC firmware version

Verify Fix Applied:

Verify firmware version matches or exceeds patched version listed in vendor advisory using PC Worx software.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to PLC programming port (TCP 1962)
  • Unexpected firmware download or programming events in PLC logs

Network Indicators:

  • Traffic to TCP port 1962 from unauthorized sources
  • Unusual PLC programming traffic patterns

SIEM Query:

source_ip NOT IN (authorized_engineering_stations) AND dest_port=1962 AND protocol=TCP

🔗 References

📤 Share & Export