A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges.
2024-05-14T16:16:36.227
2025-01-23T18:51:57.947
Analyzed
CVSSv3.1: 7.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | phoenixcontact | charx_sec-3000_firmware | ≤ 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3000 | - | No |
Operating System | phoenixcontact | charx_sec-3050_firmware | ≤ 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3050 | - | No |
Operating System | phoenixcontact | charx_sec-3100_firmware | ≤ 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3100 | - | No |
Operating System | phoenixcontact | charx_sec-3150_firmware | ≤ 1.5.1 | Yes |
Hardware | phoenixcontact | charx_sec-3150 | - | No |