An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
2024-03-12T09:15:08.730
2025-01-24T07:15:09.653
Modified
CVSSv3.1: 7.4 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.5.1 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |