CVE-2023-46143: CWE-494 Download of Code Without Integrity Check in PHOENIX CONTACT Automation Worx Software Suite
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.
AI Analysis
Technical Summary
CVE-2023-46143 is a high-severity vulnerability affecting the PHOENIX CONTACT Automation Worx Software Suite, specifically targeting classic line Programmable Logic Controllers (PLCs). The vulnerability is categorized under CWE-494, which involves the download of code without performing an integrity check. This flaw allows an unauthenticated remote attacker to modify some or all applications running on the affected PLCs. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on the integrity of the PLC applications, as attackers can alter control logic or operational parameters, potentially causing unsafe or unintended behavior in industrial processes. The vulnerability does not directly affect confidentiality or availability but poses a significant risk to operational integrity and safety. The lack of integrity verification during code download means that malicious code or altered applications can be injected into the PLCs, undermining trust in the automation environment. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently reported in the wild. However, given the critical role of PLCs in industrial automation, this vulnerability represents a serious threat vector for industrial control systems (ICS).
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on PHOENIX CONTACT PLCs, this vulnerability poses a significant operational risk. Compromise of PLC application integrity can lead to manipulation of industrial processes, potentially causing production downtime, equipment damage, safety incidents, or environmental harm. Since many European industries depend on automation and control systems for critical operations, exploitation could disrupt supply chains and essential services. The unauthenticated nature of the vulnerability increases the risk of remote attacks, including from threat actors targeting industrial environments. Furthermore, regulatory frameworks in Europe, such as NIS2 and GDPR, emphasize the protection of critical infrastructure and operational resilience, making exploitation of this vulnerability potentially subject to regulatory scrutiny and penalties. The absence of confidentiality impact reduces risk of data leakage but does not diminish the threat to operational integrity and safety.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access PLCs. Employ network-level authentication and VPNs for remote access to automation networks. Regularly audit and monitor PLC application integrity using available vendor tools or third-party solutions to detect unauthorized changes. Implement strict change management and logging for PLC programming activities. Engage with PHOENIX CONTACT support channels for updates and potential patches. Additionally, conduct employee training on recognizing suspicious activity and enforce physical security controls to prevent direct access to PLCs. Finally, develop and test incident response plans specific to ICS environments to quickly respond to potential exploitation.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Czech Republic, Sweden, Austria
CVE-2023-46143: CWE-494 Download of Code Without Integrity Check in PHOENIX CONTACT Automation Worx Software Suite
Description
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.
AI-Powered Analysis
Technical Analysis
CVE-2023-46143 is a high-severity vulnerability affecting the PHOENIX CONTACT Automation Worx Software Suite, specifically targeting classic line Programmable Logic Controllers (PLCs). The vulnerability is categorized under CWE-494, which involves the download of code without performing an integrity check. This flaw allows an unauthenticated remote attacker to modify some or all applications running on the affected PLCs. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on the integrity of the PLC applications, as attackers can alter control logic or operational parameters, potentially causing unsafe or unintended behavior in industrial processes. The vulnerability does not directly affect confidentiality or availability but poses a significant risk to operational integrity and safety. The lack of integrity verification during code download means that malicious code or altered applications can be injected into the PLCs, undermining trust in the automation environment. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently reported in the wild. However, given the critical role of PLCs in industrial automation, this vulnerability represents a serious threat vector for industrial control systems (ICS).
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on PHOENIX CONTACT PLCs, this vulnerability poses a significant operational risk. Compromise of PLC application integrity can lead to manipulation of industrial processes, potentially causing production downtime, equipment damage, safety incidents, or environmental harm. Since many European industries depend on automation and control systems for critical operations, exploitation could disrupt supply chains and essential services. The unauthenticated nature of the vulnerability increases the risk of remote attacks, including from threat actors targeting industrial environments. Furthermore, regulatory frameworks in Europe, such as NIS2 and GDPR, emphasize the protection of critical infrastructure and operational resilience, making exploitation of this vulnerability potentially subject to regulatory scrutiny and penalties. The absence of confidentiality impact reduces risk of data leakage but does not diminish the threat to operational integrity and safety.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement compensating controls immediately. These include network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access PLCs. Employ network-level authentication and VPNs for remote access to automation networks. Regularly audit and monitor PLC application integrity using available vendor tools or third-party solutions to detect unauthorized changes. Implement strict change management and logging for PLC programming activities. Engage with PHOENIX CONTACT support channels for updates and potential patches. Additionally, conduct employee training on recognizing suspicious activity and enforce physical security controls to prevent direct access to PLCs. Finally, develop and test incident response plans specific to ICS environments to quickly respond to potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2023-10-17T07:04:03.576Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f64490acd01a2492644c0
Added to database: 5/22/2025, 5:52:09 PM
Last enriched: 7/8/2025, 8:56:16 AM
Last updated: 12/2/2025, 2:27:38 PM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13505: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Datateam Information Technologies Inc. Datactive
MediumCVE-2025-13724: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in e4jvikwp VikRentCar Car Rental Management System
HighCVE-2025-13534: CWE-269 Improper Privilege Management in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2025-13516: CWE-434 Unrestricted Upload of File with Dangerous Type in brainstormforce SureMail – SMTP and Email Logs Plugin with Amazon SES, Postmark, and Other Providers
HighCVE-2025-41744: CWE-1394 Use of Default Cryptographic Key in Sprecher Automation SPRECON-E-C
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.