An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
2024-03-12T09:15:08.493
2025-01-24T07:15:09.440
Modified
CVSSv3.1: 5.9 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |