CVE-2024-25997
12.03.2024, 09:15
An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact | charx_sec-3000_firmware | 𝑥 < 1.5.1 |
phoenixcontact | charx_sec-3050_firmware | 𝑥 < 1.5.1 |
phoenixcontact | charx_sec-3100_firmware | 𝑥 < 1.5.1 |
phoenixcontact | charx_sec-3150_firmware | 𝑥 < 1.5.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration