First published: Tue Mar 12 2024(Updated: )
An unauthenticated remote attacker can DoS a control agent due to access of a uninitialized pointer which may prevent or disrupt the charging functionality.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact CHARX | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26004 has a high severity rating due to its potential to cause a denial of service for control agents.
To fix CVE-2024-26004, update the firmware of the affected Phoenixcontact CHARX devices to version 1.5.1 or later.
CVE-2024-26004 affects Phoenixcontact CHARX SEC-3000, SEC-3050, SEC-3100, and SEC-3150 firmware versions lower than 1.5.1.
CVE-2024-26004 enables unauthenticated remote denial of service attacks on affected control agents.
CVE-2024-26004 cannot be exploited locally as it specifically allows remote attackers to exploit the vulnerability.