An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device.
History

Wed, 04 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Jun 2025 09:45:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device.
Title PHOENIX CONTACT: ILC 1x1 ETH Denial of Service
Weaknesses CWE-770
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2025-06-04T09:37:34.736Z

Updated: 2025-06-04T13:16:07.981Z

Reserved: 2025-06-04T08:00:35.844Z

Link: CVE-2018-25112

cve-icon Vulnrichment

Updated: 2025-06-04T13:16:02.458Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-04T10:15:20.380

Modified: 2025-06-04T14:54:33.783

Link: CVE-2018-25112

cve-icon Redhat

No data.