First published: Tue May 14 2024(Updated: )
A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact CHARX | ||
All of | ||
Phoenix Contact CHARX SEC-3000 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <=1.5.1 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <=1.5.1 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <=1.5.1 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28135 is classified as a low severity vulnerability.
To fix CVE-2024-28135, upgrade the affected Phoenix Contact CHARX firmware to version 1.5.2 or later.
CVE-2024-28135 is a command injection vulnerability.
CVE-2024-28135 affects Phoenix Contact CHARX SEC-3000, SEC-3050, SEC-3100, and SEC-3150 firmware versions up to 1.5.1.
An attacker exploiting CVE-2024-28135 can execute remote commands as the user-app user due to improper input validation.