Phoenixcontact Security Vulnerabilities (CVEs)
Track 52 security vulnerabilities affecting Phoenixcontact products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
An unauthenticated cross-site scripting (XSS) vulnerability in pxc_Dot1xCfg.php allows attackers to trick authenticated users into clicking malicious ...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in port_util.php allows attackers to trick authenticated users into clicking malicious lin...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_PortCfg.php allows attackers to trick authenticated users into clicking malicious l...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portCntr.php allows attackers to trick authenticated users into clicking malicious ...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portSfp.php allows attackers to trick authenticated users into clicking malicious l...
Dec 9, 2025This vulnerability allows attackers to use an undocumented UART port on the PCB as a side-channel to gain read access to parts of the device's filesys...
Dec 9, 2025This vulnerability allows attackers to exploit an undocumented UART port on printed circuit boards as a side-channel attack vector to gain root access...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portCntr2.php allows attackers to trick authenticated users into sending malicious ...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_portSecCfg.php allows attackers to trick authenticated users into sending malicious...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in pxc_vlanIntfCfg.php allows attackers to trick authenticated users into sending maliciou...
Dec 9, 2025This vulnerability allows a high-privileged remote attacker with webUI admin access to brute-force the underlying OS root and user passwords due to we...
Dec 9, 2025A low-privileged remote attacker can exploit SSH functionality to execute commands after authentication, causing resource exhaustion that degrades man...
Dec 9, 2025A low-privileged remote attacker can send a webshell request with an empty command containing whitespace, causing the web server to block while waitin...
Dec 9, 2025An unauthenticated cross-site scripting (XSS) vulnerability in dyn_conn.php allows attackers to trick authenticated users into sending malicious POST ...
Dec 9, 2025This critical vulnerability allows unauthenticated remote attackers to modify device configurations, potentially leading to remote code execution with...
Jul 8, 2025This vulnerability allows a local attacker with SSH access to escalate privileges to root by exploiting improper input validation in a vulnerable scri...
Jul 8, 2025This vulnerability allows an unauthenticated attacker on the same network to modify system configuration through a specific API endpoint, granting the...
Jul 8, 2025An unauthenticated remote attacker can send malicious MQTT messages to trigger buffer overflow vulnerabilities in charging stations compliant with Ger...
Jul 8, 2025This vulnerability allows low-privileged remote attackers to execute arbitrary operating system commands with root privileges by exploiting improper i...
Sep 10, 2024This vulnerability allows low-privileged remote attackers to modify firewall configuration through environment variables, potentially causing denial o...
Sep 10, 2024A low-privileged remote attacker can modify OSPF service configuration through environment variables OSPF_INTERFACE.SIMPLE_KEY and OSPF_INTERFACE.DIGE...
Sep 10, 2024This vulnerability allows low-privileged remote attackers to modify firewall configuration settings through the FW_PORTFORWARDING.SRC_IP environment v...
Sep 10, 2024This vulnerability allows low-privileged remote attackers to execute arbitrary operating system commands as root on affected mGuard devices. Attackers...
Sep 10, 2024A low-privileged remote attacker can read and write files as root on mGuard devices due to improper input sanitization of the EMAIL_RELAY_PASSWORD var...
Sep 10, 2024An unauthenticated attacker on the local network can exploit the firmware update feature to reset the password for the low-privileged 'user-app' accou...
Aug 13, 2024A local attacker with low privileges can exploit a command injection vulnerability in the OCPP Remote service to execute arbitrary commands and gain r...
May 14, 2024A command injection vulnerability in the API allows low-privileged remote attackers to execute arbitrary code as the user-app user due to improper inp...
May 14, 2024This vulnerability allows a local low-privileged attacker to exploit an untrusted search path in a CHARX system utility to escalate privileges to root...
May 14, 2024CVE-2024-26003 is an out-of-bounds read vulnerability in a charging system control agent that allows unauthenticated remote attackers to cause a denia...
Mar 12, 2024This vulnerability allows unauthenticated remote attackers to perform man-in-the-middle attacks due to lack of encryption for sensitive data in affect...
Mar 12, 2024CVE-2024-25998 allows unauthenticated remote attackers to execute arbitrary commands on OCPP (Open Charge Point Protocol) services due to improper inp...
Mar 12, 2024This vulnerability allows unauthenticated remote attackers to write memory out of bounds via improper input validation in the MQTT stack. It affects s...
Mar 12, 2024CVE-2024-25995 allows unauthenticated remote attackers to execute arbitrary code with root privileges or cause denial of service by exploiting imprope...
Mar 12, 2024CVE-2023-5592 is a critical vulnerability in PHOENIX CONTACT industrial automation software that allows unauthenticated remote attackers to download a...
Dec 14, 2023CVE-2023-46143 is a critical vulnerability in PHOENIX CONTACT classic line PLCs that allows unauthenticated remote attackers to download and modify ap...
Dec 14, 2023This critical vulnerability in PHOENIX CONTACT industrial automation software allows unauthenticated remote attackers to upload malicious code and gai...
Dec 14, 2023This critical vulnerability allows remote unauthenticated attackers to gain full administrative access to affected PHOENIX CONTACT classic line device...
Dec 14, 2023CVE-2023-3935 is a critical heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service that allows unauthenticated remote attackers ...
Sep 13, 2023This vulnerability allows authenticated remote attackers to execute arbitrary code with root privileges on PHOENIX CONTACT WP 6xxx series web panels b...
Aug 9, 2023This vulnerability allows remote attackers with SNMPv2 write privileges to gain full administrative access to PHOENIX CONTACT WP 6xxx series web panel...
Aug 9, 2023This vulnerability allows remote attackers with knowledge of the SNMPv2 read/write community string to execute arbitrary system commands with root pri...
Aug 9, 2023CVE-2023-3526 is a cross-site scripting (XSS) vulnerability in PHOENIX CONTACT TC ROUTER and TC CLOUD CLIENT devices that allows unauthenticated remot...
Aug 8, 2023This vulnerability allows remote attackers with low-privilege access to PHOENIX CONTACT WP 6xxx series web panels to escalate privileges to full devic...
Aug 8, 2023CVE-2023-3572 is a critical vulnerability in PHOENIX CONTACT WP 6xxx series web panels that allows remote, unauthenticated attackers to execute arbitr...
Aug 8, 2023CVE-2023-1109 is a path traversal vulnerability in Phoenix Contacts ENERGY AXC PU Web service that allows authenticated users to read, write, and crea...
Apr 17, 2023This vulnerability allows authenticated admin users on PHOENIX CONTACT RAD-ISM-900-EN devices to execute arbitrary code with root privileges via the t...
May 11, 2022This vulnerability affects Phoenix Contact FL MGUARD 1102 and 1105 devices when remote logging is enabled. It causes memory exhaustion due to improper...
Nov 10, 2021This vulnerability allows an attacker to write arbitrary files outside the intended project directory by exploiting improper input validation in PC Wo...
Nov 4, 2021This vulnerability involves undocumented password-protected FTP access to the root directory in certain Phoenix Contact AXL F BK and IL BK devices. At...
Jun 25, 2021This vulnerability allows remote code execution on Phoenix Contact Classic Automation Worx Software Suite programming workstations. Attackers can mani...
Jun 25, 2021Why Monitor Phoenixcontact Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 52+ known vulnerabilities affecting Phoenixcontact products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Phoenixcontact packages in under 60 seconds. No agents required - completely agentless scanning that works across Phoenixcontact deployments.
Free vulnerability database: Access detailed information about every Phoenixcontact CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Phoenixcontact CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions