First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26000 is classified as a high severity vulnerability due to its ability to allow unauthenticated remote attackers to read memory out of bounds.
To fix CVE-2024-26000, it is recommended to update the firmware of affected devices to the latest version beyond 1.5.1.
CVE-2024-26000 affects the Phoenix Contact CHARX SEC-3000, 3050, 3100, and 3150 firmware versions prior to 1.5.1.
The impacts of CVE-2024-26000 include unauthorized access to sensitive memory information, potentially leading to system compromise.
Currently, no specific workarounds are recommended for CVE-2024-26000; updating to a secure firmware version is the primary mitigation.