A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
2025-07-08T07:15:24.493
2025-07-11T14:36:03.460
Analyzed
CVSSv3.1: 7.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | phoenixcontact | charx_sec-3000_firmware | < 1.7.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3000 | - | No |
| Operating System | phoenixcontact | charx_sec-3050_firmware | < 1.7.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3050 | - | No |
| Operating System | phoenixcontact | charx_sec-3100_firmware | < 1.7.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3100 | - | No |
| Operating System | phoenixcontact | charx_sec-3150_firmware | < 1.7.3 | Yes |
| Hardware | phoenixcontact | charx_sec-3150 | - | No |