First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHOENIX CONTACT CHARX Series | ||
All of | ||
<1.5.1 | ||
All of | ||
<1.5.1 | ||
All of | ||
<1.5.1 | ||
All of | ||
<1.5.1 | ||
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.