An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-026/ | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-06-21 01:15
Updated : 2022-06-28 10:45
NVD link : CVE-2022-31801
Mitre link : CVE-2022-31801
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
phoenixcontact-software
- proconos_eclr
phoenixcontact
- multiprog
- proconos