{
    "document": {
        "acknowledgments": [
            {
                "organization": "CERT@VDE",
                "summary": "the coordination and support with this publication.",
                "urls": [
                    "https://certvde.com"
                ]
            }
        ],
        "aggregate_severity": {
            "namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
            "text": "High"
        },
        "category": "csaf_security_advisory",
        "csaf_version": "2.0",
        "distribution": {
            "tlp": {
                "label": "WHITE",
                "url": "https://www.first.org/tlp/"
            }
        },
        "lang": "en-GB",
        "notes": [
            {
                "category": "summary",
                "text": "Vulnerabilities in .NET and Visual Studio functions System.Text.Json, System.Formats.Asn1, OPCFoundation.NetStandard.Opc.Ua.Core allow an remote attacker to execute a Denial-of-Servce attack.",
                "title": "Summary"
            },
            {
                "category": "description",
                "text": "Availability of an application programming workstation might be compromised by attacks using these vulnerabilities.",
                "title": "Impact"
            },
            {
                "category": "description",
                "text": "To mitigate the vulnerabilities and to ensure the availability of the PLCnext Engineer please ensure that only data from trusted sources are used.",
                "title": "Mitigation"
            },
            {
                "category": "description",
                "text": "Phoenix Contact recommends affected users to update to the current PLCnext Engineer 2024.0.4 LTS or 2024.6 which fixes the vulnerabilities.",
                "title": "Remediation"
            },
            {
                "category": "description",
                "text": "Engineering software platform for Phoenix Contact automation controllers. PLCnext Engineer is IEC 61131-3-compliant.",
                "title": "Product Description"
            },
            {
                "category": "general",
                "text": "For general information and recommendations on security measures to protect network-enabled\\ndevices, refer to the application note: [Application Note Security](\nhttps://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf).",
                "title": "General Recommendation"
            }
        ],
        "publisher": {
            "category": "vendor",
            "contact_details": "psirt@phoenixcontact.com",
            "name": "Phoenix Contact GmbH & Co. KG",
            "namespace": "https://phoenixcontact.com/psirt"
        },
        "references": [
            {
                "category": "external",
                "summary": "PCSA-2024/00013",
                "url": "https://phoenixcontact.com/psirt"
            },
            {
                "category": "external",
                "summary": "Phoenix Contact advisory overview at CERT@VDE",
                "url": "https://certvde.com/de/advisories/vendor/phoenixcontact/"
            },
            {
                "category": "external",
                "summary": "Phoenix Contact application note",
                "url": "https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf"
            },
            {
                "category": "self",
                "summary": "VDE-2024-067: Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer - HTML",
                "url": "https://certvde.com/en/advisories/VDE-2024-067/"
            },
            {
                "summary": "VDE-2024-067: Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer - CSAF",
                "url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-067.json",
                "category": "self"
            }
        ],
        "source_lang": "en",
        "title": "Phoenix Contact: Multiple Vulnerabilities in PLCnext Engineer",
        "tracking": {
            "aliases": [
                "VDE-2024-067",
                "PCSA-2024/00013"
            ],
            "current_release_date": "2025-05-14T13:00:14.000Z",
            "generator": {
                "date": "2024-10-30T12:08:56.895Z",
                "engine": {
                    "name": "Secvisogram",
                    "version": "2.5.12"
                }
            },
            "id": "VDE-2024-067",
            "initial_release_date": "2024-10-08T12:00:00.000Z",
            "revision_history": [
                {
                    "date": "2024-10-08T10:00:00.000Z",
                    "number": "1",
                    "summary": "A new PLCnext Engineer releases fixes known vulnerabilities in open-source libraries utilized by PLCnext Engineer."
                },
                {
                    "number": "2",
                    "date": "2024-10-30T13:00:00.000Z",
                    "summary": "no security related changes\nrevamped product tree"
                },
                {
                    "date": "2024-11-06T11:27:01.000Z",
                    "number": "3",
                    "summary": "Fix: added self-reference"
                },
                {
                    "date": "2025-04-10T13:00:00.000Z",
                    "number": "4",
                    "summary": "Fixed self-reference url"
                },
                {
                    "number": "5",
                    "summary": "Fix: added distribution",
                    "date": "2025-05-14T13:00:14.000Z"
                }
            ],
            "status": "final",
            "version": "5"
        }
    },
    "product_tree": {
        "branches": [
            {
                "branches": [
                    {
                        "name": "Software",
                        "category": "product_family",
                        "branches": [
                            {
                                "branches": [
                                    {
                                        "category": "product_version_range",
                                        "name": "<2024.0.4 LTS",
                                        "product": {
                                            "name": "PLCnext Engineer <2024.0.4 LTS",
                                            "product_id": "CSAFPID-51001",
                                            "product_identification_helper": {
                                                "model_numbers": [
                                                    "1046008"
                                                ]
                                            }
                                        }
                                    },
                                    {
                                        "category": "product_version_range",
                                        "name": "<2024.6",
                                        "product": {
                                            "name": "PLCnext Engineer <2024.6",
                                            "product_id": "CSAFPID-51002",
                                            "product_identification_helper": {
                                                "model_numbers": [
                                                    "1046008"
                                                ]
                                            }
                                        }
                                    },
                                    {
                                        "category": "product_version",
                                        "name": "2024.0.4 LTS",
                                        "product": {
                                            "name": "PLCnext Engineer 2024.0.4 LTS",
                                            "product_id": "CSAFPID-52001",
                                            "product_identification_helper": {
                                                "model_numbers": [
                                                    "1046008"
                                                ]
                                            }
                                        }
                                    },
                                    {
                                        "category": "product_version",
                                        "name": "2024.6",
                                        "product": {
                                            "name": "PLCnext Engineer 2024.6",
                                            "product_id": "CSAFPID-52002",
                                            "product_identification_helper": {
                                                "model_numbers": [
                                                    "1046008"
                                                ]
                                            }
                                        }
                                    }
                                ],
                                "name": "PLCnext Engineer",
                                "category": "product_family"
                            }
                        ]
                    }
                ],
                "category": "vendor",
                "name": "Phoenix Contact GmbH & Co. KG"
            }
        ],
        "product_groups": [
            {
                "group_id": "CSAFGID-61001",
                "product_ids": [
                    "CSAFPID-51001",
                    "CSAFPID-51002"
                ],
                "summary": "Affected Products IDs"
            },
            {
                "group_id": "CSAFGID-62001",
                "product_ids": [
                    "CSAFPID-52001",
                    "CSAFPID-52002"
                ],
                "summary": "Fixed Product IDs"
            }
        ]
    },
    "vulnerabilities": [
        {
            "cve": "CVE-2024-30105",
            "cwe": {
                "id": "CWE-400",
                "name": "Uncontrolled Resource Consumption"
            },
            "notes": [
                {
                    "category": "description",
                    "text": ".NET Core and Visual Studio Denial of Service Vulnerability.    \nDetails: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30105",
                    "title": "Description"
                }
            ],
            "product_status": {
                "fixed": [
                    "CSAFPID-52001",
                    "CSAFPID-52002"
                ],
                "known_affected": [
                    "CSAFPID-51001",
                    "CSAFPID-51002"
                ]
            },
            "remediations": [
                {
                    "category": "vendor_fix",
                    "details": "Phoenix Contact recommends affected users to update to the current PLCnext Engineer 2024.0.4 LTS or 2024.6 which fixes the vulnerabilities.",
                    "group_ids": [
                        "CSAFGID-61001"
                    ]
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "attackComplexity": "LOW",
                        "attackVector": "NETWORK",
                        "availabilityImpact": "HIGH",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH",
                        "confidentialityImpact": "NONE",
                        "environmentalScore": 7.5,
                        "environmentalSeverity": "HIGH",
                        "integrityImpact": "NONE",
                        "privilegesRequired": "NONE",
                        "scope": "UNCHANGED",
                        "temporalScore": 7.5,
                        "temporalSeverity": "HIGH",
                        "userInteraction": "NONE",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "version": "3.1"
                    },
                    "products": [
                        "CSAFPID-51001",
                        "CSAFPID-51002"
                    ]
                }
            ],
            "title": "CVE-2024-30105"
        },
        {
            "cve": "CVE-2024-33862",
            "cwe": {
                "id": "CWE-770",
                "name": "Allocation of Resources Without Limits or Throttling"
            },
            "notes": [
                {
                    "category": "description",
                    "text": "A buffer-management vulnerability in OPC Foundation OPCFoundation.NetStandard.Opc.Ua.Core before 1.05.374.54 could allow remote attackers to exhaust memory resources. It is triggered when the system receives an excessive number of messages from a remote source. This could potentially lead to a denial of service (DoS) condition, disrupting the normal operation of the system.    \n\nDetails: https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-33862.pdf",
                    "title": "Description"
                }
            ],
            "product_status": {
                "fixed": [
                    "CSAFPID-52001",
                    "CSAFPID-52002"
                ],
                "known_affected": [
                    "CSAFPID-51001",
                    "CSAFPID-51002"
                ]
            },
            "remediations": [
                {
                    "category": "vendor_fix",
                    "details": "Phoenix Contact recommends affected users to update to the current PLCnext Engineer 2024.0.4 LTS or 2024.6 which fixes the vulnerabilities.",
                    "group_ids": [
                        "CSAFGID-61001"
                    ]
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "attackComplexity": "LOW",
                        "attackVector": "NETWORK",
                        "availabilityImpact": "HIGH",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH",
                        "confidentialityImpact": "NONE",
                        "environmentalScore": 7.5,
                        "environmentalSeverity": "HIGH",
                        "integrityImpact": "NONE",
                        "privilegesRequired": "NONE",
                        "scope": "UNCHANGED",
                        "temporalScore": 7.5,
                        "temporalSeverity": "HIGH",
                        "userInteraction": "NONE",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "version": "3.1"
                    },
                    "products": [
                        "CSAFPID-51001",
                        "CSAFPID-51002"
                    ]
                }
            ],
            "title": "CVE-2024-33862"
        },
        {
            "cve": "CVE-2024-38095",
            "cwe": {
                "id": "CWE-20",
                "name": "Improper Input Validation"
            },
            "notes": [
                {
                    "category": "description",
                    "text": ".NET and Visual Studio Denial of Service Vulnerability.     \nDetails: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095",
                    "title": "Description"
                }
            ],
            "product_status": {
                "fixed": [
                    "CSAFPID-52001",
                    "CSAFPID-52002"
                ],
                "known_affected": [
                    "CSAFPID-51001",
                    "CSAFPID-51002"
                ]
            },
            "remediations": [
                {
                    "category": "vendor_fix",
                    "details": "Phoenix Contact recommends affected users to update to the current PLCnext Engineer 2024.0.4 LTS or 2024.6 which fixes the vulnerabilities.",
                    "group_ids": [
                        "CSAFGID-61001"
                    ]
                }
            ],
            "scores": [
                {
                    "cvss_v3": {
                        "attackComplexity": "LOW",
                        "attackVector": "NETWORK",
                        "availabilityImpact": "HIGH",
                        "baseScore": 7.5,
                        "baseSeverity": "HIGH",
                        "confidentialityImpact": "NONE",
                        "environmentalScore": 7.5,
                        "environmentalSeverity": "HIGH",
                        "integrityImpact": "NONE",
                        "privilegesRequired": "NONE",
                        "scope": "UNCHANGED",
                        "temporalScore": 7.5,
                        "temporalSeverity": "HIGH",
                        "userInteraction": "NONE",
                        "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                        "version": "3.1"
                    },
                    "products": [
                        "CSAFPID-51001",
                        "CSAFPID-51002"
                    ]
                }
            ],
            "title": "CVE-2024-38095"
        }
    ]
}