VDE-2020-012

Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2020-03-27 09:47 - Updated: 2025-05-22 13:03
Summary
PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT
Notes
Summary: The Phoenix Contact application 'PC WORX SRT' is installed as service. The installation path of the application is configured to have insecure permissions which allows any unprivileged user to write arbitrary files to the installation directory where all the configuration files and binaries of the service are located.
Impact: A malicious user can leverage this knowledge and override the main 'PC WORX SRT' service with a rogue binary which will result with running malicious code as SYSTEM user.
Mitigation: Customers using PC WORX SRT are strongly recommended to use the software only on single user systems where restricting the access rights of the PC WORX SRT is not necessary. Phoenix Contact strongly recommends protection measures against unauthorized access for network-compatible devices, solutions and PC-based software. For detailed information please refer to our application note: Measures to protect network-compatible devices with communication interfaces, solutions and PC-based software against unauthorized access

Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.

CWE-269 - Improper Privilege Management
Mitigation Customers using PC WORX SRT are strongly recommended to use the software only on single user systems where restricting the access rights of the PC WORX SRT is not necessary. Phoenix Contact strongly recommends protection measures against unauthorized access for network-compatible devices, solutions and PC-based software. For detailed information please refer to our application note: Measures to protect network-compatible devices with communication interfaces, solutions and PC-based software against unauthorized access
Acknowledgments
Claroty Sharon Brizino

{
  "document": {
    "acknowledgments": [
      {
        "names": [
          "Sharon Brizino"
        ],
        "organization": "Claroty",
        "summary": "discovered and reported"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "The Phoenix Contact application \u0027PC WORX SRT\u0027 is installed as service. The installation path of the application is configured to have insecure permissions which allows any unprivileged user to write arbitrary files to the installation directory where all the configuration files and binaries of the service are located.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "A malicious user can leverage this knowledge and override the main \u0027PC WORX SRT\u0027 service with a rogue binary which will result with running malicious code as SYSTEM user.",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "Customers using PC WORX SRT are strongly recommended to use the software only on single user systems where restricting the access rights of the PC WORX SRT is not necessary.\n\nPhoenix Contact strongly recommends protection measures against unauthorized access for network-compatible devices, solutions and PC-based software. For detailed information please refer to our application note:\n\nMeasures to protect network-compatible devices with communication interfaces, solutions and PC-based software against unauthorized access",
        "title": "Mitigation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@phoenixcontact.com",
      "name": "Phoenix Contact GmbH \u0026 Co. KG",
      "namespace": "https://phoenixcontact.com/psirt"
    },
    "references": [
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for Phoenix Contact",
        "url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
      },
      {
        "category": "self",
        "summary": "VDE-2020-012: PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT - HTML",
        "url": "https://certvde.com/de/advisories/VDE-2020-012/"
      },
      {
        "category": "self",
        "summary": "VDE-2020-012: PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT - CSAF",
        "url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-012.json"
      }
    ],
    "title": "PHOENIX CONTACT: Local Privilege Escalation in PC WORX SRT",
    "tracking": {
      "aliases": [
        "VDE-2020-012"
      ],
      "current_release_date": "2025-05-22T13:03:10.000Z",
      "generator": {
        "date": "2024-10-02T12:22:38.130Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.12"
        }
      },
      "id": "VDE-2020-012",
      "initial_release_date": "2020-03-27T09:47:00.000Z",
      "revision_history": [
        {
          "date": "2020-03-27T09:47:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        },
        {
          "date": "2024-11-06T11:27:01.000Z",
          "number": "2",
          "summary": "Fix: correct certvde domain, added self-reference"
        },
        {
          "date": "2025-05-22T13:03:10.000Z",
          "number": "3",
          "summary": "Fix: version space, quotation mark"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=1.14",
                    "product": {
                      "name": "Software PC WORX SRT \u003c=1.14",
                      "product_id": "CSAFPID-21001",
                      "product_identification_helper": {
                        "model_numbers": [
                          "2701680"
                        ]
                      }
                    }
                  }
                ],
                "category": "product_name",
                "name": "PC WORX SRT"
              }
            ],
            "category": "product_family",
            "name": "Software"
          }
        ],
        "category": "vendor",
        "name": "PHOENIX CONTACT"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-10939",
      "cwe": {
        "id": "CWE-269",
        "name": "Improper Privilege Management"
      },
      "notes": [
        {
          "category": "description",
          "text": "Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-21001"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Customers using PC WORX SRT are strongly recommended to use the software only on single user systems where restricting the access rights of the PC WORX SRT is not necessary.\n\nPhoenix Contact strongly recommends protection measures against unauthorized access for network-compatible devices, solutions and PC-based software. For detailed information please refer to our application note:\n\nMeasures to protect network-compatible devices with communication interfaces, solutions and PC-based software against unauthorized access",
          "product_ids": [
            "CSAFPID-21001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.8,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.8,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-21001"
          ]
        }
      ],
      "title": "CVE-2020-10939"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…