Phoenix Contact Multiprog vulnerabilities
4 known vulnerabilities affecting phoenix_contact/multiprog.
Total CVEs
4
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2
Vulnerabilities
Page 1 of 1
CVE-2023-0757CRITICALCVSS 9.8vall2023-12-14
CVE-2023-0757 [CRITICAL] CWE-732 CVE-2023-0757: Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PH
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.
cvelistv5nvd
CVE-2023-5592HIGHCVSS 7.5vall2023-12-14
CVE-2023-5592 [HIGH] CWE-494 CVE-2023-5592: Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.
cvelistv5nvd
CVE-2022-31801CRITICALCVSS 9.8vAll Versions2022-06-21
CVE-2022-31801 [CRITICAL] CWE-345 CVE-2022-31801: An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/Pr
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
cvelistv5nvd
CVE-2014-9195HIGHCVSS 7.5PoCvAll versions2015-01-17
CVE-2014-9195 [CRITICAL] CWE-306 CVE-2014-9195: Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
cvelistv5nvd