PatchSiren

PatchSiren cyber security CVE debrief

CVE-2015-2301 Festo Didactic SE CVE debrief

CVE-2015-2301 is a critical use-after-free vulnerability in PHP’s Phar archive rename handling. The supplied advisory maps the issue to Festo Didactic SE MES PC deployments and directs customers to replace XAMPP with Factory Control Panel to obtain a fixed version. Remote attackers may be able to trigger denial of service and potentially broader impact where vulnerable PHP versions are present.

Vendor
Festo Didactic SE
Product
MES PC
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2024-02-27
Original CVE updated
2026-01-27
Advisory published
2024-02-27
Advisory updated
2026-01-27

Who should care

Administrators and engineers responsible for Festo Didactic SE MES PC systems, especially any deployment that includes bundled PHP/XAMPP components or web-facing services. Security teams should also care if they manage legacy PHP 5.5.x or 5.6.x environments that may still be exposed to Phar-related inputs.

Technical summary

The vulnerability is a use-after-free in phar_rename_archive within phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6. The trigger described in the advisory is an attempted rename of a Phar archive to the name of an existing file. The source advisory ties the CVE to Festo Didactic SE MES PC and notes a vendor replacement path: Factory Control Panel instead of XAMPP.

Defensive priority

Critical; treat as urgent remediation for any affected MES PC or PHP/XAMPP deployment. The CVSS 3.0 vector provided is network-reachable, unauthenticated, no-user-interaction, with high confidentiality, integrity, and availability impact.

Recommended defensive actions

  • Replace XAMPP with the current Factory Control Panel version provided by Festo Didactic SE.
  • Contact Festo technical support at [email protected] to obtain the current fixed version.
  • Inventory MES PC installations and confirm whether they include vulnerable PHP versions or embedded XAMPP components.
  • Verify PHP is not older than 5.5.22 or 5.6.6 in any exposed or embedded deployment.
  • Restrict access to affected services until the fixed vendor package is deployed and validated.

Evidence notes

All factual claims here are limited to the supplied CSAF advisory text and its listed references. The advisory description explicitly names the PHP use-after-free, the affected version ranges, the remote impact, and the vendor remediation path. No exploit details or unsupported root-cause expansion were added.

Official resources

The supplied source advisory was initially published on 2024-02-27 and later updated/republished on 2026-01-27. The underlying PHP flaw predates that advisory and affects versions before 5.5.22 and 5.6.6.