Phoenix Contact: MULTIPROG Engineering tool and ProConOS eCLR SDK prone to CWE-732
ProConOS/ProConOS eCLR is a runtime SDK embedded in automation hardware and firmware by third-party vendors. Logic programs generated by the MULTIPROG engineering tool lack integrity and authenticity verification. An attacker can modify logic files on the engineering station or in transit, and load them into the controller without tamper detection. The malicious program can modify its own code to hide the attack. No patch is available; Phoenix Contact recommends network segmentation, VPNs, and secure handling of project data. Users must check with their specific device vendors for their implementations' resilience to this vector.
- Network access to engineering workstation running MULTIPROG or the controller
- Ability to intercept or modify logic files during transmission or at rest
- Access to project data files (e.g., via email, file transfer, or local filesystem)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fdc86113-afb0-490c-8f59-4bdaabbf0579Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.