Zurück zur Übersicht

PHOENIX CONTACT: Missing Authentication in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool

VDE-2022-028
Last update
14.05.2025 15:00
Published at
21.06.2022 07:18
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2022-028
CSAF Document

Summary

ProConOS/ProConOS eCLR designed for use in closed industrial networks provide communication protocols without authentication.
Please also refer the original ICS-CERT advisory ICSA-15-013-03 published 13 January 2015.

Impact

The identified vulnerability allows for unauthenticated users to modify programs in some controllers that are utilizing ProConOS/ProConOS eCLR and MULTIPROG products. Attackers who reengineer the communication protocols and have network or physical controller access can exploit this vulnerability. This vulnerability affects all versions of ProConOS/ProConOS eCLR and MULTIPROG from Phoenix Contact Software (formerly KW-Software).

Affected Product(s)

Model no. Product name Affected versions
MULTIPROG vers:all/* MULTIPROG vers:all/*
ProConOS eCLR vers:all/* ProConOS eCLR vers:all/*
ProConOS vers:all/* ProConOS vers:all/*

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
()
Summary

Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.

References

Mitigation

Manufacturers using ProConOS/ProConOS eCLR in their automation devices are advised to check their implementation and may publish an advisory according to their product.
Users of automation devices utilizing ProConOS/ProConOS eCLR in their automation systems may check if their application requires additional security measures like an adequate defense– in-depth networking architecture, the use of virtual private networks (VPNs) for remote access, as well as the use of firewalls for network segmentation or controller isolation. Users should check their manufacturers security advisories for more adequate information according to their dedicated device.
Generic information and recommendations for security measures to protect network-capabledevices can be found in the application note.

Revision History

Version Date Summary
1 21.06.2022 07:18 Initial revision.
2 14.05.2025 15:00 Fix: added distribution