An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phoenixcontact axc_1050_firmware |
||
phoenixcontact axc_1050_xc_firmware |
||
phoenixcontact axc_3050_firmware |
||
phoenixcontact fc_350_pci_eth_firmware |
||
phoenixcontact ilc1x0_firmware |
||
phoenixcontact ilc1x1_firmware |
||
phoenixcontact ilc_1x1_gsm\\/gprs_firmware |
||
phoenixcontact ilc_3xx_firmware |
||
phoenixcontact pc_worx_rt_basic_firmware |
||
phoenixcontact pc_worx_srt_firmware |
||
phoenixcontact rfc_430_eth-ib_firmware |
||
phoenixcontact rfc_450_eth-ib_firmware |
||
phoenixcontact rfc_460r_pn_3tx_firmware |
||
phoenixcontact rfc_460r_pn_3tx-s_firmware |
||
phoenixcontact rfc_470_pn_3tx_firmware |
||
phoenixcontact rfc_470s_pn_3tx_firmware |
||
phoenixcontact rfc_480s_pn_4tx_firmware |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Industrial systems' security got 99 problems and CVEs are one. Or more
The latest threat security research into operational technology (OT) and industrial systems identified a bunch of issues — 56 to be exact — that criminals could use to launch cyberattacks against critical infrastructure. But many of them are unfixable, due to insecure protocols and architectural designs. And this highlights a larger security problem with devices that control electric grids and keep clean water flowing through faucets, according to some industrial cybersecurity experts....