Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
Weaknesses in this category are related to the management of credentials.
Link | Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03 | third party advisory us government resource |
https://www.exploit-db.com/exploits/37066/ | exploit vdb entry third party advisory |