An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phoenixcontact axc 1050 firmware |
||
phoenixcontact axc 1050 xc firmware |
||
phoenixcontact axc 3050 firmware |
||
phoenixcontact fc 350 pci eth firmware |
||
phoenixcontact ilc1x0 firmware |
||
phoenixcontact ilc1x1 firmware |
||
phoenixcontact ilc 1x1 gsm/gprs firmware |
||
phoenixcontact ilc 3xx firmware |
||
phoenixcontact pc worx rt basic firmware |
||
phoenixcontact pc worx srt firmware |
||
phoenixcontact rfc 430 eth-ib firmware |
||
phoenixcontact rfc 450 eth-ib firmware |
||
phoenixcontact rfc 460r pn 3tx firmware |
||
phoenixcontact rfc 460r pn 3tx-s firmware |
||
phoenixcontact rfc 470 pn 3tx firmware |
||
phoenixcontact rfc 470s pn 3tx firmware |
||
phoenixcontact rfc 480s pn 4tx firmware |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Industrial systems' security got 99 problems and CVEs are one. Or more
The latest threat security research into operational technology (OT) and industrial systems identified a bunch of issues — 56 to be exact — that criminals could use to launch cyberattacks against critical infrastructure. But many of them are unfixable, due to insecure protocols and architectural designs. And this highlights a larger security problem with devices that control electric grids and keep clean water flowing through faucets, according to some industrial cybersecurity experts....