VYPR
Unrated severityNVD Advisory· Published Jan 17, 2015· Updated May 6, 2026

CVE-2014-9195

CVE-2014-9195

Description

Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.

Affected products

9
  • cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:softplc:*:*:*+ 3 more
    • cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:softplc:*:*:*
    • cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:visual_studio:*:*:*
    • cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:*:*:*:*
    • cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:single_chip:*:*:*
  • cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:express:*:*:*
    • cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:pro\+:*:*:*
  • Phoenix Contact/ProConOsv5
    Range: All versions
  • Phoenix Contact/MultiProgv5
    Range: All versions

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.