Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| PHOENIX CONTACT | MULTIPROG | all | - | |
| PHOENIX CONTACT | ProConOS eCLR (SDK) | all | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2023-46141 | 9.8 CRITICAL | Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permissio |
| CVE-2023-46142 | 8.8 HIGH | PHOENIX CONTACT: Insufficient Read and Write Protection to Logic and Runtime Data in PLCne |
| CVE-2023-46143 | 7.5 HIGH | Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check o |
| CVE-2023-5592 | 7.5 HIGH | Phoenix Contact: ProConOs prone to Download of Code Without Integrity Check |
| CVE-2023-46144 | 6.5 MEDIUM | PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check |
No comments yet