An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phoenixcontact multiprog |
||
phoenixcontact proconos |
||
phoenixcontact-software proconos eclr - |
Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Industrial systems' security got 99 problems and CVEs are one. Or more
The latest threat security research into operational technology (OT) and industrial systems identified a bunch of issues — 56 to be exact — that criminals could use to launch cyberattacks against critical infrastructure. But many of them are unfixable, due to insecure protocols and architectural designs. And this highlights a larger security problem with devices that control electric grids and keep clean water flowing through faucets, according to some industrial cybersecurity experts....