First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Charx Sec-3000 Firmware | <1.5.1 | |
Phoenixcontact Charx Sec-3000 | ||
All of | ||
Phoenixcontact Charx Sec-3050 Firmware | <1.5.1 | |
Phoenixcontact Charx Sec-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
Phoenixcontact Charx Sec-3150 Firmware | <1.5.1 | |
Phoenixcontact Charx Sec-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.