An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
2024-08-13T13:15:12.750
2025-01-29T06:15:30.670
Modified
CVSSv3.1: 5.9 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |