First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can perform a command injection in the OCPP Service with limited privileges due to improper input validation.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHOENIX CONTACT OCPP Service | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25998 is classified as a critical vulnerability due to its potential for remote command injection.
To mitigate CVE-2024-25998, ensure proper input validation in the OCPP Service and update to the latest firmware version.
CVE-2024-25998 affects Phoenix Contact OCPP Service versions prior to specified firmware updates.
An unauthenticated remote attacker can exploit CVE-2024-25998 due to improper input validation.
CVE-2024-25998 is a command injection vulnerability that allows attackers to execute arbitrary commands.