Show plain JSON{"id": "CVE-2014-9195", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2015-01-17T02:59:05.630", "references": [{"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03", "tags": ["Third Party Advisory", "US Government Resource"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://www.exploit-db.com/exploits/37066/", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ics-cert@hq.dhs.gov"}, {"url": "https://ics-cert.us-cert.gov/advisories/ICSA-15-013-03", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.exploit-db.com/exploits/37066/", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-255"}]}], "descriptions": [{"lang": "en", "value": "Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic."}, {"lang": "es", "value": "Phoenix Contact ProConOs y MultiProg no requieren autenticaci\u00f3n, lo que permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de trafico conforme con el protocolo."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "256CB792-CEAB-4036-94D2-5A0219E034C1"}, {"criteria": "cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:express:*:*:*", "vulnerable": true, "matchCriteriaId": "B9C6954C-A0F8-4E5A-BD5E-F78D4B73DBA7"}, {"criteria": "cpe:2.3:a:phoenixcontact-software:multiprog:5.0:*:*:*:pro\\+:*:*:*", "vulnerable": true, "matchCriteriaId": "8EC2041D-521F-4706-B2DF-EE11DFD37B90"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF36F6F3-3213-4959-A80D-C84B7919B8E8"}, {"criteria": "cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:single_chip:*:*:*", "vulnerable": true, "matchCriteriaId": "B902DE84-82D2-4561-AAFF-177F698714CD"}, {"criteria": "cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:softplc:*:*:*", "vulnerable": true, "matchCriteriaId": "C57B1599-F4FC-48C3-8CF8-804A42387777"}, {"criteria": "cpe:2.3:o:phoenixcontact-software:proconos_eclr:*:*:*:*:visual_studio:*:*:*", "vulnerable": true, "matchCriteriaId": "7C195310-9DA0-4B43-B476-702ED8799844"}], "operator": "OR"}]}], "sourceIdentifier": "ics-cert@hq.dhs.gov"}