First published: Tue Mar 12 2024(Updated: )
An improper input validation in the Qualcom plctool allows a local attacker with low privileges to gain root access by changing the ownership of specific files.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26002 is considered to be of medium severity due to improper input validation leading to potential root access.
To fix CVE-2024-26002, update the firmware of the affected Phoenix Contact CHARX SEC devices to version higher than 1.5.1.
CVE-2024-26002 affects the firmware versions up to 1.5.1 of Phoenix Contact CHARX SEC-3000, 3050, 3100, and 3150.
CVE-2024-26002 enables a local attacker with low privileges to gain root access by manipulating file ownership.
Yes, exploitation of CVE-2024-26002 is straightforward for a local attacker due to the improper input validation.