Vulnerability Description
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phoenixcontact-Software | Multiprog | 5.0 |
| Phoenixcontact-Software | Proconos Eclr | All versions |
Related Weaknesses (CWE)
References
- https://www.cisa.gov/news-events/ics-advisories/icsa-15-013-03
- https://www.exploit-db.com/exploits/37066/Third Party AdvisoryVDB Entry
- https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03Third Party AdvisoryUS Government Resource
- https://www.exploit-db.com/exploits/37066/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-9195?
CVE-2014-9195 is a vulnerability with a CVSS score of 10.0 (HIGH). Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
How severe is CVE-2014-9195?
CVE-2014-9195 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9195?
Check the references section above for vendor advisories and patch information. Affected products include: Phoenixcontact-Software Multiprog, Phoenixcontact-Software Proconos Eclr.