Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
2015-01-17T02:59:05.630
2025-04-12T10:46:40.837
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | phoenixcontact-software | multiprog | 5.0 | Yes |
Application | phoenixcontact-software | multiprog | 5.0 | Yes |
Application | phoenixcontact-software | multiprog | 5.0 | Yes |
Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
Operating System | phoenixcontact-software | proconos_eclr | * | Yes |
Operating System | phoenixcontact-software | proconos_eclr | * | Yes |