Vulnerability Details CVE-2020-12498
mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 70.4%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 6.8
Products affected by CVE-2020-12498
-
cpe:2.3:a:phoenixcontact:pc_worx:-
-
cpe:2.3:a:phoenixcontact:pc_worx:1.10
-
cpe:2.3:a:phoenixcontact:pc_worx:1.20
-
cpe:2.3:a:phoenixcontact:pc_worx:1.23
-
cpe:2.3:a:phoenixcontact:pc_worx:1.30
-
cpe:2.3:a:phoenixcontact:pc_worx:1.40
-
cpe:2.3:a:phoenixcontact:pc_worx:1.50
-
cpe:2.3:a:phoenixcontact:pc_worx:1.60
-
cpe:2.3:a:phoenixcontact:pc_worx:1.70
-
cpe:2.3:a:phoenixcontact:pc_worx:1.80
-
cpe:2.3:a:phoenixcontact:pc_worx:1.81
-
cpe:2.3:a:phoenixcontact:pc_worx:1.82
-
cpe:2.3:a:phoenixcontact:pc_worx:1.83
-
cpe:2.3:a:phoenixcontact:pc_worx:1.84
-
cpe:2.3:a:phoenixcontact:pc_worx:1.85
-
cpe:2.3:a:phoenixcontact:pc_worx:1.86
-
cpe:2.3:a:phoenixcontact:pc_worx_express:-
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.10
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.20
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.23
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.30
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.40
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.50
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.60
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.70
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.80
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.81
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.82
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.83
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.84
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.85
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.86
-
cpe:2.3:a:phoenixcontact:pc_worx_express:1.87