An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.
2024-03-12T09:15:09.823
2025-01-23T18:51:10.803
Analyzed
CVSSv3.1: 8.7 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3000 | - | No |
Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3050 | - | No |
Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3100 | - | No |
Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3150 | - | No |