Vulnerabilities > Phoenixcontact Software
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-06-21 | CVE-2022-31801 | Insufficient Verification of Data Authenticity vulnerability in multiple products An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device. | 10.0 |
2015-01-17 | CVE-2014-9195 | Credentials Management vulnerability in Phoenixcontact-Software Multiprog and Proconos Eclr Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic. | 7.5 |