First published: Wed May 29 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of Phoenix Contact CHARX SEC-3100 devices. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-28133.
Affected Software | Affected Version | How to fix |
---|---|---|
PHOENIX CONTACT CHARX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-519 is classified as a critical vulnerability due to its potential for privilege escalation.
To fix ZDI-24-519, update the Phoenix Contact CHARX SEC-3100 devices to the latest firmware version provided by the vendor.
ZDI-24-519 affects installations of the Phoenix Contact CHARX SEC-3100 devices if they have local access to the system.
No, ZDI-24-519 requires local access to the target system for exploitation.
The potential impacts of ZDI-24-519 include unauthorized privilege escalation, allowing an attacker to gain higher-level access to system functionalities.