Vulnerability Details : CVE-2014-9195
Public exploit exists!
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.
Products affected by CVE-2014-9195
- cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:express:*:*:*
- cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:pro\+:*:*:*
- cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:visual_studio:*:*:*
- cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:single_chip:*:*:*
- cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:*:*:*:*
- cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:softplc:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9195
6.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-9195
-
PhoenixContact PLC Remote START/STOP Command
Disclosure Date: 2015-05-20First seen: 2020-04-26auxiliary/admin/scada/phoenix_commandPhoenixContact Programmable Logic Controllers are built upon a variant of ProConOS. Communicating using a proprietary protocol over ports TCP/1962 and TCP/41100 or TCP/20547. It allows a remote user to read out the PLC Type, Firmware and Build number on port
CVSS scores for CVE-2014-9195
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-9195
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9195
-
https://www.exploit-db.com/exploits/37066/
Phoenix Contact ILC 150 ETH PLC - Remote Control Script - Hardware remote ExploitThird Party Advisory;VDB Entry
-
https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03
Phoenix Contact Software ProConOs and MultiProg Authentication Vulnerability | CISAThird Party Advisory;US Government Resource
Jump to