First published: Tue Aug 13 2024(Updated: )
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Charx Sec-3150 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3150 | ||
All of | ||
Phoenixcontact Charx Sec-3100 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3100 | ||
All of | ||
Phoenixcontact Charx Sec-3050 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3050 | ||
All of | ||
Phoenixcontact Charx Sec-3000 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.