Vulnerabilites related to Phoenix Contact - ProConOs
CVE-2022-31801 (GCVE-0-2022-31801)
Vulnerability from cvelistv5
Published
2022-06-21 08:00
Modified
2024-09-16 18:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-345 - Insufficient Verification of Data Authenticity
Summary
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
References
▼ | URL | Tags |
---|---|---|
https://cert.vde.com/en/advisories/VDE-2022-026/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | PHOENIX CONTACT | MULTIPROG |
Version: All Versions |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.136Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-026/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MULTIPROG", "vendor": "PHOENIX CONTACT", "versions": [ { "status": "affected", "version": "All Versions" } ] }, { "product": "ProConOS", "vendor": "PHOENIX CONTACT", "versions": [ { "status": "affected", "version": "All Versions" } ] }, { "product": "ProConOS eCLR", "vendor": "PHOENIX CONTACT", "versions": [ { "status": "affected", "version": "All Versions" } ] } ], "credits": [ { "lang": "en", "value": "This vulnerability was reported by Forescout." } ], "datePublic": "2022-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-21T08:00:31", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-026/" } ], "source": { "advisory": "VDE-2022-026", "discovery": "EXTERNAL" }, "title": "Insufficient Verification of Data Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2022-06-21T07:00:00.000Z", "ID": "CVE-2022-31801", "STATE": "PUBLIC", "TITLE": "Insufficient Verification of Data Vulnerability in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MULTIPROG", "version": { "version_data": [ { "version_affected": "=", "version_name": "All Versions", "version_value": "All Versions" } ] } }, { "product_name": "ProConOS", "version": { "version_data": [ { "version_affected": "=", "version_name": "All Versions", "version_value": "All Versions" } ] } }, { "product_name": "ProConOS eCLR", "version": { "version_data": [ { "version_affected": "=", "version_name": "All Versions", "version_value": "All Versions" } ] } } ] }, "vendor_name": "PHOENIX CONTACT" } ] } }, "credit": [ { "lang": "eng", "value": "This vulnerability was reported by Forescout." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345 Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en/advisories/VDE-2022-026/", "refsource": "CONFIRM", "url": "https://cert.vde.com/en/advisories/VDE-2022-026/" } ] }, "source": { "advisory": "VDE-2022-026", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-31801", "datePublished": "2022-06-21T08:00:31.688772Z", "dateReserved": "2022-05-30T00:00:00", "dateUpdated": "2024-09-16T18:50:12.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-9195 (GCVE-0-2014-9195)
Vulnerability from cvelistv5
Published
2015-01-17 02:00
Modified
2025-09-05 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
References
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-15-013-03 | ||
https://www.exploit-db.com/exploits/37066/ | exploit, x_refsource_EXPLOIT-DB |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Phoenix Contact | ProConOs |
Version: All versions |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:40:24.556Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03" }, { "name": "37066", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/37066/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "ProConOs", "vendor": "Phoenix Contact", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unaffected", "product": "MultiProg", "vendor": "Phoenix Contact", "versions": [ { "status": "affected", "version": "All versions" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Reid Wightman of Digital Bond" } ], "datePublic": "2015-01-13T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePhoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.\u003c/p\u003e" } ], "value": "Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-05T21:03:14.656Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-013-03" }, { "name": "37066", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/37066/" } ], "source": { "advisory": "ICSA-15-013-03", "discovery": "EXTERNAL" }, "title": "Phoenix Contact Software ProConOs and MultiProg Missing Authentication for Critical Function", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Phoenix Contact Software designed the applications and protocols without\n authentication mechanisms. It is the understanding of Phoenix Contact \nSoftware that vendors using the application software and its protocol \nwould incorporate its own authentication mechanism in its final product.\n Phoenix Contact Software is considering adding authentication software \ninto future versions of its application software and its protocol.\n\n\u003cbr\u003e" } ], "value": "Phoenix Contact Software designed the applications and protocols without\n authentication mechanisms. It is the understanding of Phoenix Contact \nSoftware that vendors using the application software and its protocol \nwould incorporate its own authentication mechanism in its final product.\n Phoenix Contact Software is considering adding authentication software \ninto future versions of its application software and its protocol." } ], "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-9195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03" }, { "name": "37066", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/37066/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-9195", "datePublished": "2015-01-17T02:00:00", "dateReserved": "2014-12-02T00:00:00", "dateUpdated": "2025-09-05T21:03:14.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201501-0401
Vulnerability from variot
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic. Phoenix Contact ProConOs and MultiProg are applications that run processes to control and manage IEC 61131 logic. Phoenix Contact ProConOs and MultiProg are prone to an authentication-bypass vulnerability. Attackers can exploit this issue to bypass authentication mechanism and gain unauthorized access. http://drupal.org/node/207891
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201501-0401", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "multiprog", "scope": "eq", "trust": 1.6, "vendor": "phoenixcontact", "version": "5.0" }, { "model": "proconos eclr", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.8, "vendor": "proconos eclr", "version": "*" }, { "model": "multiprog", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": null }, { "model": "proconos", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": null }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "multiprog", "version": "5.0" }, { "model": "contact phoenix contact proconos and multiprog", "scope": null, "trust": 0.6, "vendor": "phoenix", "version": null }, { "model": "proconos eclr", "scope": "eq", "trust": 0.6, "vendor": "pheonixcontact", "version": "visual_studio" }, { "model": "proconos eclr", "scope": null, "trust": 0.6, "vendor": "pheonixcontact", "version": null }, { "model": "proconos eclr", "scope": "eq", "trust": 0.6, "vendor": "pheonixcontact", "version": "single_chip" }, { "model": "multiprog", "scope": "eq", "trust": 0.6, "vendor": "pheonixcontact", "version": "5.0" }, { "model": "proconos eclr", "scope": "eq", "trust": 0.6, "vendor": "pheonixcontact", "version": "softplc" }, { "model": "contact proconos", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "0" }, { "model": "contact multiprog", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "0" } ], "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "BID", "id": "72063" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNNVD", "id": "CNNVD-201501-318" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:pheonixcontact-software:multiprog", "vulnerable": true }, { "cpe22Uri": "cpe:/o:pheonixcontact-software:proconos_eclr", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007726" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Reid Wightman of Digital Bond.", "sources": [ { "db": "BID", "id": "72063" }, { "db": "CNNVD", "id": "CNNVD-201501-318" } ], "trust": 0.9 }, "cve": "CVE-2014-9195", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-9195", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2015-00410", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "a90acc0a-2351-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-9195", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-9195", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2015-00410", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201501-318", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNNVD", "id": "CNNVD-201501-318" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic. Phoenix Contact ProConOs and MultiProg are applications that run processes to control and manage IEC 61131 logic. Phoenix Contact ProConOs and MultiProg are prone to an authentication-bypass vulnerability. \nAttackers can exploit this issue to bypass authentication mechanism and gain unauthorized access. \nhttp://drupal.org/node/207891", "sources": [ { "db": "NVD", "id": "CVE-2014-9195" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "BID", "id": "72063" }, { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-9195", "trust": 3.5 }, { "db": "ICS CERT", "id": "ICSA-15-013-03", "trust": 3.3 }, { "db": "BID", "id": "72063", "trust": 1.5 }, { "db": "EXPLOIT-DB", "id": "37066", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2015-00410", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201501-318", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2014-007726", "trust": 0.8 }, { "db": "BID", "id": "72064", "trust": 0.6 }, { "db": "IVD", "id": "A90ACC0A-2351-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "BID", "id": "72063" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNNVD", "id": "CNNVD-201501-318" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "id": "VAR-201501-0401", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" } ], "trust": 1.8 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" } ] }, "last_update_date": "2024-11-23T22:52:49.169000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "https://www.phoenixcontact.com/online/portal/de?1dmy\u0026urile=wcm%3apath%3a/dede/web/home" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007726" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-255", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-013-03" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/37066/" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9195" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9195" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/72064" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/72063" }, { "trust": 0.3, "url": "https://www.phoenixcontact.com/online/portal/pc" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "BID", "id": "72063" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNNVD", "id": "CNNVD-201501-318" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2015-00410" }, { "db": "BID", "id": "72063" }, { "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "db": "CNNVD", "id": "CNNVD-201501-318" }, { "db": "NVD", "id": "CVE-2014-9195" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-19T00:00:00", "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "date": "2015-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-00410" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72063" }, { "date": "2015-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "date": "2015-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-318" }, { "date": "2015-01-17T02:59:05.630000", "db": "NVD", "id": "CVE-2014-9195" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-00410" }, { "date": "2015-01-13T00:00:00", "db": "BID", "id": "72063" }, { "date": "2015-01-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-007726" }, { "date": "2015-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201501-318" }, { "date": "2024-11-21T02:20:22.783000", "db": "NVD", "id": "CVE-2014-9195" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201501-318" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phoenix Contact ProConOs and MultiProg Vulnerabilities in arbitrary command execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-007726" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Trust management", "sources": [ { "db": "IVD", "id": "a90acc0a-2351-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201501-318" } ], "trust": 0.8 } }