CVE-2022-31800

An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
References
Link Resource
https://cert.vde.com/en/advisories/VDE-2022-025/ Exploit Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2022-025/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:phoenixcontact:axc_1050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:axc_1050:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:phoenixcontact:axc_1050_xc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:axc_1050_xc:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:phoenixcontact:axc_3050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:axc_3050:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:phoenixcontact:fc_350_pci_eth_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:fc_350_pci_eth:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:phoenixcontact:ilc1x0_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:ilc1x0:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:phoenixcontact:ilc1x1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:ilc1x1:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:phoenixcontact:ilc_1x1_gsm\/gprs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:ilc_1x1_gsm\/gprs:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:phoenixcontact:ilc_3xx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:ilc_3xx:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:phoenixcontact:pc_worx_rt_basic_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:pc_worx_rt_basic:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:phoenixcontact:pc_worx_srt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:pc_worx_srt:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_430_eth-ib_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_430_eth-ib:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_450_eth-ib_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_450_eth-ib:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_460r_pn_3tx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_460r_pn_3tx:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_460r_pn_3tx-s_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_460r_pn_3tx-s:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_470_pn_3tx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_470_pn_3tx:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_470s_pn_3tx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_470s_pn_3tx:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:phoenixcontact:rfc_480s_pn_4tx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rfc_480s_pn_4tx:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:05

Type Values Removed Values Added
References () https://cert.vde.com/en/advisories/VDE-2022-025/ - Exploit, Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2022-025/ - Exploit, Third Party Advisory

Information

Published : 2022-06-21 08:15

Updated : 2024-11-21 07:05


NVD link : CVE-2022-31800

Mitre link : CVE-2022-31800

CVE.ORG link : CVE-2022-31800


JSON object : View

Products Affected

phoenixcontact

  • ilc_3xx
  • rfc_460r_pn_3tx
  • rfc_470s_pn_3tx_firmware
  • rfc_480s_pn_4tx
  • rfc_470_pn_3tx_firmware
  • fc_350_pci_eth_firmware
  • axc_3050
  • rfc_470_pn_3tx
  • axc_1050_xc_firmware
  • axc_3050_firmware
  • rfc_430_eth-ib_firmware
  • ilc_1x1_gsm\/gprs_firmware
  • axc_1050_firmware
  • rfc_480s_pn_4tx_firmware
  • ilc1x1
  • pc_worx_rt_basic
  • rfc_460r_pn_3tx-s
  • fc_350_pci_eth
  • rfc_450_eth-ib_firmware
  • axc_1050_xc
  • ilc_3xx_firmware
  • axc_1050
  • rfc_460r_pn_3tx-s_firmware
  • pc_worx_rt_basic_firmware
  • ilc1x0_firmware
  • ilc1x1_firmware
  • ilc1x0
  • ilc_1x1_gsm\/gprs
  • rfc_430_eth-ib
  • rfc_470s_pn_3tx
  • pc_worx_srt
  • pc_worx_srt_firmware
  • rfc_460r_pn_3tx_firmware
  • rfc_450_eth-ib
CWE
CWE-345

Insufficient Verification of Data Authenticity