CVE-2022-31800
21.06.2022, 08:15
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact | axc_1050_firmware | * |
phoenixcontact | axc_1050_xc_firmware | * |
phoenixcontact | axc_3050_firmware | * |
phoenixcontact | fc_350_pci_eth_firmware | * |
phoenixcontact | ilc1x0_firmware | * |
phoenixcontact | ilc1x1_firmware | * |
phoenixcontact | ilc_1x1_gsm\/gprs_firmware | * |
phoenixcontact | ilc_3xx_firmware | * |
phoenixcontact | pc_worx_rt_basic_firmware | * |
phoenixcontact | pc_worx_srt_firmware | * |
phoenixcontact | rfc_430_eth-ib_firmware | * |
phoenixcontact | rfc_450_eth-ib_firmware | * |
phoenixcontact | rfc_460r_pn_3tx_firmware | * |
phoenixcontact | rfc_460r_pn_3tx-s_firmware | * |
phoenixcontact | rfc_470_pn_3tx_firmware | * |
phoenixcontact | rfc_470s_pn_3tx_firmware | * |
phoenixcontact | rfc_480s_pn_4tx_firmware | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration