CVE-2024-3913
13.08.2024, 13:15
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact | charx_sec_3000 | 1.7.0 < 𝑥 < 1.7.0 |
phoenixcontact | charx_sec_3050 | 1.7.0 < 𝑥 < 1.7.0 |
phoenixcontact | charx_sec_3100 | 1.7.0 < 𝑥 < 1.7.0 |
phoenixcontact | charx_sec_3150 | 1.7.0 < 𝑥 < 1.7.0 |
phoenixcontact | charx_sec-3150_firmware | 𝑥 < 1.6.3 |
phoenixcontact | charx_sec-3100_firmware | 𝑥 < 1.6.3 |
phoenixcontact | charx_sec-3050_firmware | 𝑥 < 1.6.3 |
phoenixcontact | charx_sec-3000_firmware | 𝑥 < 1.6.3 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration