First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact CHARX | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25997 is considered to have a moderate severity due to the potential for log injection by unauthenticated remote attackers.
To mitigate CVE-2024-25997, upgrade the affected firmware to version 1.5.1 or later for the Phoenix Contact CHARX devices.
CVE-2024-25997 affects the Phoenix Contact CHARX Sec-3000, Sec-3050, Sec-3100, and Sec-3150 devices with firmware versions prior to 1.5.1.
CVE-2024-25997 is a log injection vulnerability resulting from improper input validation.
Yes, CVE-2024-25997 can be exploited remotely by unauthenticated attackers.