Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Phoenix Contact Software designed the applications and protocols without authentication mechanisms. It is the understanding of Phoenix Contact Software that vendors using the application software and its protocol would incorporate its own authentication mechanism in its final product. Phoenix Contact Software is considering adding authentication software into future versions of its application software and its protocol.

History

Fri, 05 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Title Phoenix Contact Software ProConOs and MultiProg Missing Authentication for Critical Function
Weaknesses CWE-306
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P'}

cvssV2_0

{'score': 10, 'vector': 'AV:N/AC:L/Au:N/C:C/I:C/A:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-05T21:03:14.656Z

Reserved: 2014-12-02T00:00:00

Link: CVE-2014-9195

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-01-17T02:59:05.630

Modified: 2025-09-05T21:15:32.540

Link: CVE-2014-9195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.