First published: Tue May 14 2024(Updated: )
A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Charx Sec-3000 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3000 | ||
All of | ||
Phoenixcontact Charx Sec-3050 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
Phoenixcontact Charx Sec-3150 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.