First published: Tue Aug 13 2024(Updated: )
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Charx Sec-3000 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3000 | ||
All of | ||
Phoenixcontact Charx Sec-3050 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3050 | ||
All of | ||
Phoenix Contact CHARX SEC-3100 | <1.6.3 | |
Phoenix Contact CHARX SEC-3100 | ||
All of | ||
Phoenixcontact Charx Sec-3150 Firmware | <1.6.3 | |
Phoenixcontact Charx Sec-3150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.