Vulnerabilities > Phoenixcontact Software

DATE CVE VULNERABILITY TITLE RISK
2022-06-21 CVE-2022-31801 Insufficient Verification of Data Authenticity vulnerability in multiple products
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
network
low complexity
phoenixcontact phoenixcontact-software CWE-345
critical
10.0
2015-01-17 CVE-2014-9195 Credentials Management vulnerability in Phoenixcontact-Software Multiprog and Proconos Eclr
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
network
low complexity
phoenixcontact-software CWE-255
7.5