CVE-2023-46143: CWE-494 Download of Code Without Integrity Check in PHOENIX CONTACT Automation Worx Software Suite
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.
AI Analysis
Technical Summary
CVE-2023-46143 is a high-severity vulnerability affecting the PHOENIX CONTACT Automation Worx Software Suite, specifically targeting classic line Programmable Logic Controllers (PLCs). The vulnerability is categorized under CWE-494, which involves the download of code without performing an integrity check. This flaw allows an unauthenticated remote attacker to modify some or all applications running on the affected PLCs. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on the integrity of the PLC applications, as attackers can alter control logic or operational parameters, potentially causing unsafe or unintended behavior in industrial processes. The vulnerability does not directly affect confidentiality or availability but poses a significant risk to operational integrity and safety. The lack of integrity verification during code download means that malicious code or altered applications can be injected into the PLCs, undermining trust in the automation environment. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently reported in the wild. However, given the critical role of PLCs in industrial automation, this vulnerability represents a serious threat vector for industrial control systems (ICS).
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on PHOENIX CONTACT PLCs, this vulnerability poses a significant operational risk. Compromise of PLC application integrity can lead to manipulation of industrial processes, potentially causing production downtime, equipment damage, safety incidents, or environmental harm. Since many European industries depend on automation and control systems for critical operations, exploitation could disrupt supply chains and essential services. The unauthenticated nature of the vulnerability increases the risk of remote attacks, including from threat actors targeting industrial environments. Furthermore, regulatory frameworks in Europe, such as NIS2 and GDPR, emphasize the protection of critical infrastructure and operational resilience, making exploitation of this vulnerability potentially subject to regulatory scrutiny and penalties. The absence of confidentiality impact reduces risk of data leakage but does not diminish the threat to operational integrity and safety.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access PLCs. Employ network-level authentication and VPNs for remote access to automation networks. Regularly audit and monitor PLC application integrity using available vendor tools or third-party solutions to detect unauthorized changes. Implement strict change management and logging for PLC programming activities. Engage with PHOENIX CONTACT support channels for updates and potential patches. Additionally, conduct employee training on recognizing suspicious activity and enforce physical security controls to prevent direct access to PLCs. Finally, develop and test incident response plans specific to ICS environments to quickly respond to potential exploitation.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden, Austria
CVE-2023-46143: CWE-494 Download of Code Without Integrity Check in PHOENIX CONTACT Automation Worx Software Suite
Description
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.
AI-Powered Analysis
Technical Analysis
CVE-2023-46143 is a high-severity vulnerability affecting the PHOENIX CONTACT Automation Worx Software Suite, specifically targeting classic line Programmable Logic Controllers (PLCs). The vulnerability is categorized under CWE-494, which involves the download of code without performing an integrity check. This flaw allows an unauthenticated remote attacker to modify some or all applications running on the affected PLCs. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on the integrity of the PLC applications, as attackers can alter control logic or operational parameters, potentially causing unsafe or unintended behavior in industrial processes. The vulnerability does not directly affect confidentiality or availability but poses a significant risk to operational integrity and safety. The lack of integrity verification during code download means that malicious code or altered applications can be injected into the PLCs, undermining trust in the automation environment. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently reported in the wild. However, given the critical role of PLCs in industrial automation, this vulnerability represents a serious threat vector for industrial control systems (ICS).
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on PHOENIX CONTACT PLCs, this vulnerability poses a significant operational risk. Compromise of PLC application integrity can lead to manipulation of industrial processes, potentially causing production downtime, equipment damage, safety incidents, or environmental harm. Since many European industries depend on automation and control systems for critical operations, exploitation could disrupt supply chains and essential services. The unauthenticated nature of the vulnerability increases the risk of remote attacks, including from threat actors targeting industrial environments. Furthermore, regulatory frameworks in Europe, such as NIS2 and GDPR, emphasize the protection of critical infrastructure and operational resilience, making exploitation of this vulnerability potentially subject to regulatory scrutiny and penalties. The absence of confidentiality impact reduces risk of data leakage but does not diminish the threat to operational integrity and safety.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access PLCs. Employ network-level authentication and VPNs for remote access to automation networks. Regularly audit and monitor PLC application integrity using available vendor tools or third-party solutions to detect unauthorized changes. Implement strict change management and logging for PLC programming activities. Engage with PHOENIX CONTACT support channels for updates and potential patches. Additionally, conduct employee training on recognizing suspicious activity and enforce physical security controls to prevent direct access to PLCs. Finally, develop and test incident response plans specific to ICS environments to quickly respond to potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2023-10-17T07:04:03.576Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f64490acd01a2492644c0
Added to database: 5/22/2025, 5:52:09 PM
Last enriched: 7/8/2025, 8:56:16 AM
Last updated: 7/31/2025, 4:10:04 PM
Views: 13
Related Threats
Researcher to release exploit for full auth bypass on FortiWeb
HighCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.