Phoenixcontact

Charx Sec-3000 Firmware

29 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 13.08.2024 13:15:12
  • Zuletzt bearbeitet 29.01.2025 06:15:30

An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.

  • EPSS 0.07%
  • Veröffentlicht 14.05.2024 16:16:42
  • Zuletzt bearbeitet 23.01.2025 18:55:34

A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.

  • EPSS 0.27%
  • Veröffentlicht 14.05.2024 16:16:40
  • Zuletzt bearbeitet 24.01.2025 07:15:10

A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.

  • EPSS 0.99%
  • Veröffentlicht 14.05.2024 16:16:39
  • Zuletzt bearbeitet 24.01.2025 07:15:09

A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.

  • EPSS 0.66%
  • Veröffentlicht 14.05.2024 16:16:37
  • Zuletzt bearbeitet 23.01.2025 18:53:02

An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based management access with the privileges of the currently logged in user due to cleartext...

  • EPSS 0.08%
  • Veröffentlicht 14.05.2024 16:16:36
  • Zuletzt bearbeitet 23.01.2025 18:51:57

A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges. 

  • EPSS 0.12%
  • Veröffentlicht 12.03.2024 09:15:09
  • Zuletzt bearbeitet 23.01.2025 18:51:10

An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.

  • EPSS 0.21%
  • Veröffentlicht 12.03.2024 09:15:09
  • Zuletzt bearbeitet 23.01.2025 18:50:20

An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS. 

  • EPSS 0.62%
  • Veröffentlicht 12.03.2024 09:15:09
  • Zuletzt bearbeitet 23.01.2025 18:48:50

An unauthenticated remote attacker can DoS a control agent due to access of a uninitialized pointer which may prevent or disrupt the charging functionality.

  • EPSS 0.57%
  • Veröffentlicht 12.03.2024 09:15:09
  • Zuletzt bearbeitet 23.01.2025 18:48:31

An unauthenticated remote attacker can DoS the control agent due to a out-of-bounds read which may prevent or disrupt the charging functionality.