First published: Tue Aug 13 2024(Updated: )
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenix Contact CHARX SEC-3000 | <1.6.3 | |
Phoenix Contact CHARX SEC-3000 | ||
All of | ||
Phoenix Contact CHARX SEC-3050 Firmware | <1.6.3 | |
Phoenix Contact CHARX SEC-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.6.3 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
PhoenixContact CHARX SEC-3150 Firmware | <1.6.3 | |
Phoenix Contact CHARX SEC-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6788 is considered a high-severity vulnerability due to its potential for unauthorized access through the firmware update feature.
To mitigate CVE-2024-6788, update the Phoenix Contact CHARX SEC firmware to version 1.6.3 or later.
CVE-2024-6788 affects users of Phoenix Contact CHARX SEC-3000, CHARX SEC-3050, CHARX SEC-3100, and CHARX SEC-3150 devices with firmware versions prior to 1.6.3.
CVE-2024-6788 can be exploited by a remote unauthenticated attacker using the firmware update feature on the LAN interface.
The impact of CVE-2024-6788 allows an attacker to reset the password of the low-privileged user 'user-app' to its default setting.