Vulnerabilities > Phoenixcontact > Charx SEC 3100 Firmware

DATE CVE VULNERABILITY TITLE RISK
2024-08-13 CVE-2024-6788 Unspecified vulnerability in Phoenixcontact products
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
network
low complexity
phoenixcontact
critical
9.8
2024-08-13 CVE-2024-3913 Unspecified vulnerability in Phoenixcontact products
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
network
high complexity
phoenixcontact
5.9
2024-03-12 CVE-2024-25996 Unspecified vulnerability in Phoenixcontact products
An unauthenticated remote attacker can perform a remote code execution due to an origin validation error.
network
low complexity
phoenixcontact
critical
9.8
2024-03-12 CVE-2024-25999 Unspecified vulnerability in Phoenixcontact products
An unauthenticated local attacker can perform a privilege escalation due to improper input validation in the OCPP agent service. 
local
low complexity
phoenixcontact
7.8
2024-03-12 CVE-2024-26000 Out-of-bounds Read vulnerability in Phoenixcontact products
An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
network
low complexity
phoenixcontact CWE-125
7.5
2024-03-12 CVE-2024-26001 Out-of-bounds Write vulnerability in Phoenixcontact products
An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack.
network
low complexity
phoenixcontact CWE-787
critical
9.8