CVE Vulnerabilities

CVE-2022-31800

Insufficient Verification of Data Authenticity

Published: Jun 21, 2022 | Modified: Jun 28, 2022
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
10 HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

Name Vendor Start Version End Version
Axc_1050_firmware Phoenixcontact * *

References