First published: Thu Dec 14 2023(Updated: )
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact MultiProg | ||
Phoenix Contact Proconos Eclr |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0757 has a high severity rating, indicating a significant risk of unauthorized access and exploitation.
To fix CVE-2023-0757, update PHOENIX CONTACT MULTIPROG or PHOENIX CONTACT ProConOS eCLR to the latest version provided by the vendor.
CVE-2023-0757 affects users of PHOENIX CONTACT MULTIPROG and PHOENIX CONTACT ProConOS eCLR software.
Yes, CVE-2023-0757 can be exploited remotely by an unauthenticated attacker to upload malicious code.
The potential impacts of CVE-2023-0757 include gaining full access to the affected devices and compromising system integrity.