Learn about CVE-2022-31800 affecting PHOENIX CONTACT classic line industrial controllers. An unauthenticated attacker can gain full control over devices. Find mitigation steps here.
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Understanding CVE-2022-31800
This CVE affects multiple products from PHOENIX CONTACT classic line industrial controllers, leaving them vulnerable to a critical security threat.
What is CVE-2022-31800?
The vulnerability in PHOENIX CONTACT classic line industrial controllers allows an unauthenticated, remote attacker to upload malicious logic and take complete control of the affected device.
The Impact of CVE-2022-31800
With a CVSS base score of 9.8 (Critical), this vulnerability has a significant impact on confidentiality, integrity, and availability. Attackers can exploit this flaw to compromise sensitive data, manipulate device functionality, and disrupt operations.
Technical Details of CVE-2022-31800
The vulnerability is classified under CWE-345 (Insufficient Verification of Data Authenticity) and is discovered by Forescout.
Vulnerability Description
An unauthenticated attacker can upload malicious logic to devices running ProConOS/ProConOS eCLR, leading to complete device compromise.
Affected Systems and Versions
PHOENIX CONTACT classic line industrial controllers including ILC 1x0, ILC 1x1, ILC 1x1 GSM/GPRS, AXC 1050, AXC 1050 XC, AXC 3050, RFC series, RFC 430 ETH-IB, RFC 450 ETH-IB, PC WORX series, and FC 350 PCI ETH are among the affected products.
Exploitation Mechanism
The vulnerability allows attackers to remotely upload malicious code to the targeted devices without the need for any privileges, enabling them to execute arbitrary commands.
Mitigation and Prevention
It is crucial to take immediate actions to secure the PHOENIX CONTACT classic line industrial controllers and prevent potential exploitation.
Immediate Steps to Take
Organizations should apply security patches provided by PHOENIX CONTACT, restrict network access to vulnerable devices, and monitor for any suspicious activity.
Long-Term Security Practices
Regularly update and patch the controllers, implement network segmentation, conduct security training for staff, and deploy intrusion detection systems to enhance resilience against such threats.
Patching and Updates
Stay informed about security advisories from PHOENINX CONTACT, follow best security practices, and promptly apply patches to mitigate the risk of exploitation.