Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-8380

Severity
7.3HIGH
EPSS
12.5%
top 6.06%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 5
Latest updateMay 14

Description

The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4

Affected Packages1 packages

CVEListV5phoenix_contact/phoenix_contact_ilc_plcsAll ILC 1xx PLCs

🔴Vulnerability Details

2
GHSA
GHSA-23m3-jp2w-3vpp: The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication2022-05-14
CVEList
CVE-2016-8380: The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication2018-04-05

💥Exploits & PoCs

1
Exploit-DB
Phoenix Contact WebVisit 2985725 - Authentication Bypass2018-10-12
CVE-2016-8380 (HIGH CVSS 7.3) | The web server in Phoenix Contact I | cvebase.io