Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
2015-01-17T02:59:05.630
2025-09-05T21:15:32.540
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | phoenixcontact-software | multiprog | 5.0 | Yes |
| Application | phoenixcontact-software | multiprog | 5.0 | Yes |
| Application | phoenixcontact-software | multiprog | 5.0 | Yes |
| Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
| Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
| Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
| Operating System | phoenixcontact-software | proconos_eclr | * | Yes |