Skip to main content

CVE-2018-25112: CWE-770 Allocation of Resources Without Limits or Throttling in PHOENIX CONTACT ILC 131

High
VulnerabilityCVE-2018-25112cvecve-2018-25112cwe-770
Published: Wed Jun 04 2025 (06/04/2025, 09:37:34 UTC)
Source: CVE Database V5
Vendor/Project: PHOENIX CONTACT
Product: ILC 131

Description

An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device.

AI-Powered Analysis

AILast updated: 07/06/2025, 00:12:48 UTC

Technical Analysis

CVE-2018-25112 is a high-severity vulnerability affecting the PHOENIX CONTACT ILC 131 programmable logic controller (PLC) devices. The root cause is an uncontrolled resource consumption issue (CWE-770) within the IEC 61131 program running on these devices. Specifically, an unauthenticated remote attacker can generate large volumes of network traffic directed at the ILC 131 device. Because the device lacks proper limits or throttling mechanisms on resource allocation, this flood of traffic overwhelms the device's processing capabilities. The consequence is a denial-of-service (DoS) condition, rendering the device unresponsive or inoperable. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 7.5, reflecting the ease of exploitation (network accessible, no privileges required) and the significant impact on availability, although confidentiality and integrity are not affected. No known exploits in the wild have been reported, and no patches or mitigations are currently linked. The vulnerability affects all versions of the ILC 131 product line, indicating a systemic design flaw in resource management within the IEC 61131 runtime environment on these devices. This vulnerability is particularly critical because PLCs like the ILC 131 are often deployed in industrial control systems (ICS) and critical infrastructure environments, where availability is paramount.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those operating industrial automation and control systems that rely on PHOENIX CONTACT ILC 131 devices. A successful DoS attack could disrupt manufacturing processes, utilities, transportation systems, or building automation, leading to operational downtime, financial losses, and potential safety hazards. Since the vulnerability can be exploited remotely without authentication, attackers could launch attacks from outside the network perimeter, increasing the risk of widespread disruption. The loss of availability in critical ICS components can also have cascading effects on supply chains and service delivery. Furthermore, the inability to patch or mitigate the vulnerability promptly could prolong exposure. European organizations in sectors such as energy, manufacturing, water treatment, and transportation that utilize these PLCs are at heightened risk. The disruption caused by this vulnerability could also attract regulatory scrutiny under frameworks like NIS2, which mandate robust cybersecurity measures for critical infrastructure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement specific mitigations to reduce risk. First, network segmentation is critical: isolate ILC 131 devices within dedicated industrial networks with strict access controls to limit exposure to untrusted networks. Deploy network-level rate limiting and traffic filtering to detect and block anomalous traffic patterns indicative of DoS attempts targeting these devices. Intrusion detection and prevention systems (IDS/IPS) should be tuned to monitor for excessive traffic flows to PLCs. Employ strict firewall rules that restrict incoming traffic to only authorized management stations and trusted sources. Additionally, implement robust monitoring and alerting to detect early signs of resource exhaustion on these devices. Where possible, consider deploying redundant PLCs or failover mechanisms to maintain operational continuity in case of device failure. Engage with PHOENIX CONTACT support channels to obtain any forthcoming patches or firmware updates addressing this vulnerability. Finally, review and harden IEC 61131 program configurations to minimize unnecessary network exposure and resource consumption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-06-04T08:00:35.844Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68401554182aa0cae2a7706b

Added to database: 6/4/2025, 9:43:48 AM

Last enriched: 7/6/2025, 12:12:48 AM

Last updated: 7/30/2025, 9:47:21 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats