First published: Tue May 14 2024(Updated: )
A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Charx Sec-3000 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3000 | ||
All of | ||
Phoenixcontact Charx Sec-3050 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
Phoenixcontact Charx Sec-3150 Firmware | <=1.5.1 | |
Phoenixcontact Charx Sec-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.