First published: Tue May 14 2024(Updated: )
A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact CHARX | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <=1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <=1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28133 is categorized as a low severity vulnerability.
CVE-2024-28133 allows a local low privileged attacker to exploit an untrusted search path in CHARX utilities to gain root privileges.
CVE-2024-28133 affects versions up to and including 1.5.1 of the Phoenix Contact CHARX firmware.
No, CVE-2024-28133 requires local access to the CHARX system to be exploited.
To mitigate CVE-2024-28133, upgrade to the latest firmware version that addresses this vulnerability.