A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
2024-08-13T14:15:16.457
2025-08-22T11:15:30.207
Modified
CVSSv3.1: 8.6 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.6.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |