CVE-2022-31800 — Insufficient Verification of Data Authenticity in Contact AXC 1050
Severity
9.8CRITICALNVD
EPSS
1.6%
top 18.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 21
Latest updateJun 22
Description
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages17 packages
🔴Vulnerability Details
2GHSA▶
GHSA-m7x4-j34m-52hc: An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the dev↗2022-06-22
CVEList▶
Insufficient Verification of Data Vulnerability in PHOENIX CONTACT classic line industrial controllers↗2022-06-21