Skip to main content

CVE-2025-41668: CWE-59 Improper Link Resolution Before File Access ('Link Following') in PHOENIX CONTACT AXC F 1152

High
VulnerabilityCVE-2025-41668cvecve-2025-41668cwe-59
Published: Tue Jul 08 2025 (07/08/2025, 07:04:22 UTC)
Source: CVE Database V5
Vendor/Project: PHOENIX CONTACT
Product: AXC F 1152

Description

A low privileged remote attacker with file access can replace a critical file or folder used by the service security-profile to get read, write and execute access to any file on the device.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:39:33 UTC

Technical Analysis

CVE-2025-41668 is a high-severity vulnerability classified under CWE-59: Improper Link Resolution Before File Access ('Link Following') affecting the PHOENIX CONTACT AXC F 1152 industrial controller. This vulnerability allows a low-privileged remote attacker who already has some file access on the device to exploit improper handling of symbolic links or similar link mechanisms. By replacing a critical file or folder used by the service 'security-profile', the attacker can escalate privileges to gain read, write, and execute access to any file on the device. The vulnerability arises because the system does not properly validate or resolve symbolic links before accessing files, enabling an attacker to redirect file operations to arbitrary locations. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although exploitation requires some initial file access (low privilege), the attacker can leverage this to fully compromise the device, potentially leading to complete system takeover. No known public exploits are reported yet, and no patches are currently linked, indicating that mitigation may require vendor intervention or manual workarounds.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, and automation that deploy PHOENIX CONTACT AXC F 1152 controllers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to manipulate industrial control processes, disrupt operations, or exfiltrate sensitive operational data. The ability to gain full file system access undermines device integrity and availability, potentially causing production downtime or safety hazards. Given the widespread use of PHOENIX CONTACT products in European industrial environments, the impact could extend to supply chain disruptions and economic losses. Furthermore, attackers could use compromised devices as footholds for lateral movement within industrial networks, increasing the risk of broader operational technology (OT) network compromise.

Mitigation Recommendations

Organizations should immediately audit access controls to ensure that only trusted and authenticated users have file access on AXC F 1152 devices. Network segmentation should be enforced to restrict remote file access to these devices. Monitoring for unusual file system changes or symbolic link manipulations can help detect exploitation attempts. Until a vendor patch is available, consider implementing strict file integrity monitoring and disabling any unnecessary remote file access services. Employing application whitelisting or restricting execution permissions on critical directories may reduce exploitation risk. Engage with PHOENIX CONTACT support to obtain guidance or firmware updates addressing this vulnerability. Additionally, conduct thorough security assessments of industrial controllers to identify and remediate similar link-following weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.307Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cc7a96f40f0eb72f25244

Added to database: 7/8/2025, 7:24:25 AM

Last enriched: 7/8/2025, 7:39:33 AM

Last updated: 7/8/2025, 7:39:33 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats