A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-20405 A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0001}

epss

{'score': 0.00011}


Fri, 11 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Phoenixcontact
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware
CPEs cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:*
Vendors & Products Phoenixcontact
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware

Tue, 08 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Jul 2025 07:15:00 +0000

Type Values Removed Values Added
Description A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
Title Privilege Escalation via Insecure SSH Permissions
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-07-08T14:29:19.578Z

Reserved: 2025-01-16T15:48:36.250Z

Link: CVE-2025-24006

cve-icon Vulnrichment

Updated: 2025-07-08T14:23:39.660Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-08T07:15:24.493

Modified: 2025-07-11T14:36:03.460

Link: CVE-2025-24006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses