An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
History

Fri, 13 Sep 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware
CPEs cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:*
Vendors & Products Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware

Tue, 13 Aug 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Phoenixcontact
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050
Phoenixcontact charx Sec 3100
Phoenixcontact charx Sec 3150
CPEs cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*
Vendors & Products Phoenixcontact
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050
Phoenixcontact charx Sec 3100
Phoenixcontact charx Sec 3150
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 12:45:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
Title Phoenix Contact: Start sequence allows attack during the boot process
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2024-08-13T12:30:33.535Z

Updated: 2024-08-13T13:56:57.855Z

Reserved: 2024-04-17T07:09:02.592Z

Link: CVE-2024-3913

cve-icon Vulnrichment

Updated: 2024-08-13T13:56:49.342Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-13T13:15:12.750

Modified: 2024-09-13T15:58:13.780

Link: CVE-2024-3913

cve-icon Redhat

No data.