Skip to main content

CVE-2023-46143: CWE-494 Download of Code Without Integrity Check in PHOENIX CONTACT Automation Worx Software Suite

High
VulnerabilityCVE-2023-46143cvecve-2023-46143cwe-494
Published: Thu Dec 14 2023 (12/14/2023, 14:06:06 UTC)
Source: CVE
Vendor/Project: PHOENIX CONTACT
Product: Automation Worx Software Suite

Description

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

AI-Powered Analysis

AILast updated: 07/08/2025, 08:56:16 UTC

Technical Analysis

CVE-2023-46143 is a high-severity vulnerability affecting the PHOENIX CONTACT Automation Worx Software Suite, specifically targeting classic line Programmable Logic Controllers (PLCs). The vulnerability is categorized under CWE-494, which involves the download of code without performing an integrity check. This flaw allows an unauthenticated remote attacker to modify some or all applications running on the affected PLCs. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The impact is primarily on the integrity of the PLC applications, as attackers can alter control logic or operational parameters, potentially causing unsafe or unintended behavior in industrial processes. The vulnerability does not directly affect confidentiality or availability but poses a significant risk to operational integrity and safety. The lack of integrity verification during code download means that malicious code or altered applications can be injected into the PLCs, undermining trust in the automation environment. No patches or mitigations have been officially released at the time of publication, and no known exploits are currently reported in the wild. However, given the critical role of PLCs in industrial automation, this vulnerability represents a serious threat vector for industrial control systems (ICS).

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors relying on PHOENIX CONTACT PLCs, this vulnerability poses a significant operational risk. Compromise of PLC application integrity can lead to manipulation of industrial processes, potentially causing production downtime, equipment damage, safety incidents, or environmental harm. Since many European industries depend on automation and control systems for critical operations, exploitation could disrupt supply chains and essential services. The unauthenticated nature of the vulnerability increases the risk of remote attacks, including from threat actors targeting industrial environments. Furthermore, regulatory frameworks in Europe, such as NIS2 and GDPR, emphasize the protection of critical infrastructure and operational resilience, making exploitation of this vulnerability potentially subject to regulatory scrutiny and penalties. The absence of confidentiality impact reduces risk of data leakage but does not diminish the threat to operational integrity and safety.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement compensating controls immediately. These include network segmentation to isolate PLCs from general IT networks and restrict access to trusted management stations only. Deploy strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access PLCs. Employ network-level authentication and VPNs for remote access to automation networks. Regularly audit and monitor PLC application integrity using available vendor tools or third-party solutions to detect unauthorized changes. Implement strict change management and logging for PLC programming activities. Engage with PHOENIX CONTACT support channels for updates and potential patches. Additionally, conduct employee training on recognizing suspicious activity and enforce physical security controls to prevent direct access to PLCs. Finally, develop and test incident response plans specific to ICS environments to quickly respond to potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2023-10-17T07:04:03.576Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f64490acd01a2492644c0

Added to database: 5/22/2025, 5:52:09 PM

Last enriched: 7/8/2025, 8:56:16 AM

Last updated: 7/31/2025, 4:10:04 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats