Vulnerability Details : CVE-2023-5592
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.
Products affected by CVE-2023-5592
- cpe:2.3:a:phoenixcontact:multiprog:*:*:*:*:*:*:*:*
- cpe:2.3:a:phoenixcontact:proconos_eclr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-5592
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 20 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-5592
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
CERT VDE |
CWE ids for CVE-2023-5592
-
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.Assigned by: info@cert.vde.com (Primary)
References for CVE-2023-5592
-
https://cert.vde.com/en/advisories/VDE-2023-054/
VDE-2023-054 | CERT@VDEThird Party Advisory
Jump to