First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can upload a arbitrary script file due to improper input validation. The upload destination is fixed and is write only.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact CHARX | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PHOENIX CONTACT CHARX Series | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25994 is considered a high severity vulnerability due to its potential for unauthenticated remote code execution.
To mitigate CVE-2024-25994, you should upgrade the firmware of the affected Phoenix Contact CHARX devices to version 1.5.1 or later.
CVE-2024-25994 affects the Phoenix Contact CHARX series devices, specifically the CHARX SEC-3000, 3050, 3100, and 3150 firmware versions prior to 1.5.1.
CVE-2024-25994 exploits improper input validation that allows unauthenticated remote attackers to upload arbitrary script files.
Exploitation of CVE-2024-25994 can lead to the execution of arbitrary scripts on the affected devices, potentially compromising their functionality and security.