First published: Fri Jun 21 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CharxSystemConfigManager service, which listens on TCP port 5001 by default. The issue results from the lack of proper validation of a user-supplied string before using it to update a configuration. An attacker can leverage this vulnerability to execute code in the context of the service account.
Affected Software | Affected Version | How to fix |
---|---|---|
PHOENIX CONTACT CHARX Series | ||
PHOENIX CONTACT CHARX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-23158 is considered critical due to the potential for remote code execution.
To fix ZDI-CAN-23158, update your Phoenix Contact CHARX SEC-3100 device to the latest version as recommended by the vendor.
ZDI-CAN-23158 affects installations of Phoenix Contact CHARX SEC-3100 devices.
ZDI-CAN-23158 is associated with network-adjacent attacks that can execute arbitrary code.
No, authentication is not required to exploit the ZDI-CAN-23158 vulnerability.