Phoenixcontact

Charx Sec-3100

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 08.07.2025 07:01:33
  • Zuletzt bearbeitet 11.07.2025 14:37:11

An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.

  • EPSS 0.27%
  • Veröffentlicht 08.07.2025 07:00:58
  • Zuletzt bearbeitet 11.07.2025 14:37:08

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

  • EPSS 0.07%
  • Veröffentlicht 08.07.2025 07:00:42
  • Zuletzt bearbeitet 11.07.2025 14:37:05

An unauthenticated local attacker can inject a command that is subsequently executed as root, leading to a privilege escalation.

  • EPSS 0.07%
  • Veröffentlicht 08.07.2025 07:00:27
  • Zuletzt bearbeitet 11.07.2025 14:37:03

An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.

  • EPSS 0.02%
  • Veröffentlicht 08.07.2025 07:00:03
  • Zuletzt bearbeitet 11.07.2025 14:36:03

A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.

  • EPSS 0.03%
  • Veröffentlicht 08.07.2025 06:59:45
  • Zuletzt bearbeitet 11.07.2025 14:36:07

A local attacker with a local user account can leverage a vulnerable script via SSH to escalate privileges to root due to improper input validation.

  • EPSS 0.03%
  • Veröffentlicht 08.07.2025 06:59:32
  • Zuletzt bearbeitet 11.07.2025 14:36:09

A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by...

  • EPSS 0.12%
  • Veröffentlicht 08.07.2025 06:59:17
  • Zuletzt bearbeitet 11.07.2025 14:36:12

An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these s...

  • EPSS 0.11%
  • Veröffentlicht 08.07.2025 06:58:58
  • Zuletzt bearbeitet 11.07.2025 14:36:14

An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.

  • EPSS 0.12%
  • Veröffentlicht 14.01.2025 14:15:27
  • Zuletzt bearbeitet 14.01.2025 14:15:27

An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.