Vulnerabilities > Phoenixcontact > Charx SEC 3000 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-08-13 | CVE-2024-6788 | Unspecified vulnerability in Phoenixcontact products A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password. | 9.8 |
2024-08-13 | CVE-2024-3913 | Unspecified vulnerability in Phoenixcontact products An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. | 5.9 |
2024-03-12 | CVE-2024-25996 | Unspecified vulnerability in Phoenixcontact products An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. | 9.8 |
2024-03-12 | CVE-2024-25999 | Unspecified vulnerability in Phoenixcontact products An unauthenticated local attacker can perform a privilege escalation due to improper input validation in the OCPP agent service. | 7.8 |
2024-03-12 | CVE-2024-26000 | Out-of-bounds Read vulnerability in Phoenixcontact products An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization. | 7.5 |
2024-03-12 | CVE-2024-26001 | Out-of-bounds Write vulnerability in Phoenixcontact products An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. | 9.8 |