CVE-2025-41668: CWE-59 Improper Link Resolution Before File Access ('Link Following') in PHOENIX CONTACT AXC F 1152
A low privileged remote attacker with file access can replace a critical file or folder used by the service security-profile to get read, write and execute access to any file on the device.
AI Analysis
Technical Summary
CVE-2025-41668 is a high-severity vulnerability classified under CWE-59: Improper Link Resolution Before File Access ('Link Following') affecting the PHOENIX CONTACT AXC F 1152 industrial controller. This vulnerability allows a low-privileged remote attacker who already has some file access on the device to exploit improper handling of symbolic links or similar link mechanisms. By replacing a critical file or folder used by the service 'security-profile', the attacker can escalate privileges to gain read, write, and execute access to any file on the device. The vulnerability arises because the system does not properly validate or resolve symbolic links before accessing files, enabling an attacker to redirect file operations to arbitrary locations. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although exploitation requires some initial file access (low privilege), the attacker can leverage this to fully compromise the device, potentially leading to complete system takeover. No known public exploits are reported yet, and no patches are currently linked, indicating that mitigation may require vendor intervention or manual workarounds.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, and automation that deploy PHOENIX CONTACT AXC F 1152 controllers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to manipulate industrial control processes, disrupt operations, or exfiltrate sensitive operational data. The ability to gain full file system access undermines device integrity and availability, potentially causing production downtime or safety hazards. Given the widespread use of PHOENIX CONTACT products in European industrial environments, the impact could extend to supply chain disruptions and economic losses. Furthermore, attackers could use compromised devices as footholds for lateral movement within industrial networks, increasing the risk of broader operational technology (OT) network compromise.
Mitigation Recommendations
Organizations should immediately audit access controls to ensure that only trusted and authenticated users have file access on AXC F 1152 devices. Network segmentation should be enforced to restrict remote file access to these devices. Monitoring for unusual file system changes or symbolic link manipulations can help detect exploitation attempts. Until a vendor patch is available, consider implementing strict file integrity monitoring and disabling any unnecessary remote file access services. Employing application whitelisting or restricting execution permissions on critical directories may reduce exploitation risk. Engage with PHOENIX CONTACT support to obtain guidance or firmware updates addressing this vulnerability. Additionally, conduct thorough security assessments of industrial controllers to identify and remediate similar link-following weaknesses.
Affected Countries
Germany, France, Italy, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-41668: CWE-59 Improper Link Resolution Before File Access ('Link Following') in PHOENIX CONTACT AXC F 1152
Description
A low privileged remote attacker with file access can replace a critical file or folder used by the service security-profile to get read, write and execute access to any file on the device.
AI-Powered Analysis
Technical Analysis
CVE-2025-41668 is a high-severity vulnerability classified under CWE-59: Improper Link Resolution Before File Access ('Link Following') affecting the PHOENIX CONTACT AXC F 1152 industrial controller. This vulnerability allows a low-privileged remote attacker who already has some file access on the device to exploit improper handling of symbolic links or similar link mechanisms. By replacing a critical file or folder used by the service 'security-profile', the attacker can escalate privileges to gain read, write, and execute access to any file on the device. The vulnerability arises because the system does not properly validate or resolve symbolic links before accessing files, enabling an attacker to redirect file operations to arbitrary locations. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. Although exploitation requires some initial file access (low privilege), the attacker can leverage this to fully compromise the device, potentially leading to complete system takeover. No known public exploits are reported yet, and no patches are currently linked, indicating that mitigation may require vendor intervention or manual workarounds.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, and automation that deploy PHOENIX CONTACT AXC F 1152 controllers, this vulnerability poses a significant risk. Successful exploitation could allow attackers to manipulate industrial control processes, disrupt operations, or exfiltrate sensitive operational data. The ability to gain full file system access undermines device integrity and availability, potentially causing production downtime or safety hazards. Given the widespread use of PHOENIX CONTACT products in European industrial environments, the impact could extend to supply chain disruptions and economic losses. Furthermore, attackers could use compromised devices as footholds for lateral movement within industrial networks, increasing the risk of broader operational technology (OT) network compromise.
Mitigation Recommendations
Organizations should immediately audit access controls to ensure that only trusted and authenticated users have file access on AXC F 1152 devices. Network segmentation should be enforced to restrict remote file access to these devices. Monitoring for unusual file system changes or symbolic link manipulations can help detect exploitation attempts. Until a vendor patch is available, consider implementing strict file integrity monitoring and disabling any unnecessary remote file access services. Employing application whitelisting or restricting execution permissions on critical directories may reduce exploitation risk. Engage with PHOENIX CONTACT support to obtain guidance or firmware updates addressing this vulnerability. Additionally, conduct thorough security assessments of industrial controllers to identify and remediate similar link-following weaknesses.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.307Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cc7a96f40f0eb72f25244
Added to database: 7/8/2025, 7:24:25 AM
Last enriched: 7/8/2025, 7:39:33 AM
Last updated: 7/8/2025, 7:39:33 AM
Views: 2
Related Threats
CVE-2025-7172: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-6744: CWE-94 Improper Control of Generation of Code ('Code Injection') in xTemos Woodmart
HighCVE-2025-7171: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-7170: SQL Injection in code-projects Crime Reporting System
MediumCVE-2025-7169: SQL Injection in code-projects Crime Reporting System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.