10
CVSSv2

CVE-2022-31800

Published: 21/06/2022 Updated: 28/06/2022
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

phoenixcontact axc 1050 firmware

phoenixcontact axc 1050 xc firmware

phoenixcontact axc 3050 firmware

phoenixcontact fc 350 pci eth firmware

phoenixcontact ilc1x0 firmware

phoenixcontact ilc1x1 firmware

phoenixcontact ilc 1x1 gsm/gprs firmware

phoenixcontact ilc 3xx firmware

phoenixcontact pc worx rt basic firmware

phoenixcontact pc worx srt firmware

phoenixcontact rfc 430 eth-ib firmware

phoenixcontact rfc 450 eth-ib firmware

phoenixcontact rfc 460r pn 3tx firmware

phoenixcontact rfc 460r pn 3tx-s firmware

phoenixcontact rfc 470 pn 3tx firmware

phoenixcontact rfc 470s pn 3tx firmware

phoenixcontact rfc 480s pn 4tx firmware

Recent Articles

What to do about inherent security flaws in critical infrastructure?
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Industrial systems' security got 99 problems and CVEs are one. Or more

The latest threat security research into operational technology (OT) and industrial systems identified a bunch of issues — 56 to be exact — that criminals could use to launch cyberattacks against critical infrastructure.  But many of them are unfixable, due to insecure protocols and architectural designs. And this highlights a larger security problem with devices that control electric grids and keep clean water flowing through faucets, according to some industrial cybersecurity experts....