9.8
CVE-2024-6788
- EPSS 3.4%
- Veröffentlicht 13.08.2024 14:15:16
- Zuletzt bearbeitet 22.08.2025 11:15:30
- Quelle info@cert.vde.com
- Teams Watchlist Login
- Unerledigt Login
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Phoenixcontact ≫ Charx Sec-3000 Firmware Version < 1.6.3
Phoenixcontact ≫ Charx Sec-3050 Firmware Version < 1.6.3
Phoenixcontact ≫ Charx Sec-3100 Firmware Version < 1.6.3
Phoenixcontact ≫ Charx Sec-3150 Firmware Version < 1.6.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 3.4% | 0.87 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
info@cert.vde.com | 8.6 | 3.9 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
|
CWE-1392 Use of Default Credentials
The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.