Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-3913


An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.


Published

2024-08-13T13:15:12.750

Last Modified

2025-01-29T06:15:30.670

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.9 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-552

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System phoenixcontact charx_sec-3150_firmware < 1.6.3 Yes
Hardware phoenixcontact charx_sec-3150 - No
Operating System phoenixcontact charx_sec-3100_firmware < 1.6.3 Yes
Hardware phoenixcontact charx_sec-3100 - No
Operating System phoenixcontact charx_sec-3050_firmware < 1.6.3 Yes
Hardware phoenixcontact charx_sec-3050 - No
Operating System phoenixcontact charx_sec-3000_firmware < 1.6.3 Yes
Hardware phoenixcontact charx_sec-3000 - No

References