First published: Fri Jun 21 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CharxSystemConfigManager service, which listens on TCP port 5001 by default. The issue results from the lack of proper validation of a user-supplied string before using it to update a configuration. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
PHOENIX CONTACT CHARX Series | ||
PHOENIX CONTACT CHARX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-856 is high due to the potential for remote code execution by unauthenticated network-adjacent attackers.
To fix ZDI-24-856, update the Phoenix Contact CHARX SEC-3100 device to the latest firmware version provided by the vendor.
The vulnerability ZDI-24-856 affects installations of Phoenix Contact CHARX SEC-3100 devices.
Yes, ZDI-24-856 can be exploited remotely without the need for authentication.
The vulnerable component in ZDI-24-856 is the CharxSystemConfigManager service within the CHARX SEC-3100 devices.