%PDF-1.4
%
1 0 obj
<<
/Author (PHOENIX CONTACT GmbH & Co. KG)
/CreationDate (D:20220610130616+02'00')
/Creator (PDF-XChange Office Addin)
/CreatorTool (PDF-XChange Standard \(9.2 build 359\) [GDI] [Windows 10 Professional x64 \(Build 19044\)])
/Keywords (300550605\r\nCVE-2014-9195\r\nVDE-2022-028)
/ModDate (D:20220610130723+02'00')
/Producer (PDF-XChange Standard \(9.2 build 359\) [GDI] [Windows 10 Professional x64 \(Build 19044\)])
/Subject (ProConOS/ProConOS eCLR designed for use in closed industrial networks provide communication protocols without authentication.)
/Title (Security Advisory for unauthenticated Protocols in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool)
>>
endobj
2 0 obj
<<
/Metadata 3 0 R
/Names <<
/Dests 4 0 R
>>
/Pages 5 0 R
/Type /Catalog
>>
endobj
3 0 obj
<<
/Length 3973
/Subtype /XML
/Type /Metadata
>>
stream
application/pdf
Security Advisory for unauthenticated Protocols in ProConOS/ProConOS eCLR SDK and MULTIPROG Engineering tool
PHOENIX CONTACT GmbH & Co. KG
ProConOS/ProConOS eCLR designed for use in closed industrial networks provide communication protocols without authentication.
300550605
CVE-2014-9195
VDE-2022-028
uuid:1689d309-8709-4e57-9fc7-2305399b4496
uuid:aaab43c1-6743-4e05-b230-6da67721d010
PDF-XChange Office Addin
2022-06-10T13:06:16+02:00
2022-06-10T13:07:23+02:00
PDF-XChange Standard (9.2 build 359) [GDI] [Windows 10 Professional x64 (Build 19044)]
PDF-XChange Standard (9.2 build 359) [GDI] [Windows 10 Professional x64 (Build 19044)]
300550605
CVE-2014-9195
VDE-2022-028
endstream
endobj
4 0 obj
<<
/Names [(Address) [6 0 R /XYZ 72 685.900024 0] (Date) [6 0 R /XYZ 68.550003 598.950012 0] (Enclosures) [7 0 R /XYZ 68.550003 586.849976 0] (Sign2) [6 0 R /XYZ 68.550003 573.599976 0] (Subject) [6 0 R /XYZ 68.550003 548.799988 0]]
>>
endobj
5 0 obj
<<
/Count 3
/Kids [6 0 R 8 0 R 7 0 R]
/Type /Pages
>>
endobj
6 0 obj
<<
/Annots [9 0 R 10 0 R 11 0 R]
/Contents 12 0 R
/MediaBox [0 0 595.2 841.92]
/Parent 5 0 R
/Resources <<
/Font <<
/F0 13 0 R
/F1 14 0 R
>>
/XObject <<
/Im0 15 0 R
>>
>>
/Type /Page
>>
endobj
7 0 obj
<<
/Annots [16 0 R]
/Contents 17 0 R
/MediaBox [0 0 595.2 841.92]
/Parent 5 0 R
/Resources <<
/Font <<
/F0 13 0 R
/F1 14 0 R
>>
/XObject <<
/Im0 18 0 R
>>
>>
/Type /Page
>>
endobj
8 0 obj
<<
/Annots [19 0 R 20 0 R 21 0 R]
/Contents 22 0 R
/MediaBox [0 0 595.2 841.92]
/Parent 5 0 R
/Resources <<
/Font <<
/F0 13 0 R
/F1 14 0 R
>>
/XObject <<
/Im0 18 0 R
>>
>>
/Type /Page
>>
endobj
9 0 obj
<<
/A <<
/S /URI
/URI (https://www.cisa.gov/uscert/ics/advisories/ICSA-15-013-03)
>>
/Border [0 0 0]
/C [0 0 0]
/F 4
/M (D:20220610130616+02'00')
/NM (a0053acf-69f7-47d3-8b57b852bf59efdf)
/P 6 0 R
/Rect [386.25 379.149994 465.75 392.149994]
/Subtype /Link
/Type /Annot
>>
endobj
10 0 obj
<<
/A <<
/S /URI
/URI (https://nvd.nist.gov/vuln/detail/CVE-2014-9195)
>>
/Border [0 0 0]
/C [0 0 0]
/F 4
/M (D:20220610130616+02'00')
/NM (da659aed-459b-44b4-8886f491d71d0f65)
/P 6 0 R
/Rect [68.25 303.700012 147 316.700012]
/Subtype /Link
/Type /Annot
>>
endobj
11 0 obj
<<
/A <<
/S /URI
/URI (https://cert.vde.com/de/advisories/VDE-2022-028)
>>
/Border [0 0 0]
/C [0 0 0]
/F 4
/M (D:20220610130616+02'00')
/NM (746734d7-0286-4423-920191c518b66838)
/P 6 0 R
/Rect [68.25 292 141 304]
/Subtype /Link
/Type /Annot
>>
endobj
12 0 obj
<<
/Filter /FlateDecode
/Length 2103
>>
stream
xڭWr+zT<Ԏ"iYH+f 1$hYT/KTe#9stBB0[93'^˷'0[ARy`V^|eo.U>Pfl4
hP+xqYo`4U@ TA4m2g?g]).oo\*g- T T1[hmP&o#~WG؇f17ִDel T@Q|6{k1k 5}F*frQ̚wAiv
BTmt$4dUHYaONBѥx8-nP,w}%M
W^
':\i10gc̓ڣF}\'Gq}ָ70aGyMSȄ Ԃ_ W)aUW*fQ3~'ۮ"3u sNpʹo`cO~(? [*:0]- rc:PY)rB3". $AQ~)ގ`2
T>&A)6L|r`,GjWz$\F"`}q{25GAem|"noi@ 2-M/ /c؇eHK>:~Dr2DMU*O[BBTF?Hy:ȡOo
րJڵq,cc1n .2)hX=U3Ug3J+`~cB,zS½]ںYPge&3xjۻG0