CVE-2024-7698 – Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products
https://notcve.org/view.php?id=CVE-2024-7698
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •
CVE-2024-7734 – Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.
https://notcve.org/view.php?id=CVE-2024-7734
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers. • https://cert.vde.com/en/advisories/VDE-2024-052 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2024-6788 – Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password
https://notcve.org/view.php?id=CVE-2024-6788
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password. • https://github.com/zetraxz/CVE-2024-6788 https://cert.vde.com/en/advisories/VDE-2024-022 • CWE-1188: Initialization of a Resource with an Insecure Default •
CVE-2024-3913 – Phoenix Contact: Start sequence allows attack during the boot process
https://notcve.org/view.php?id=CVE-2024-3913
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall. The issue results from incorrect ordering and synchronization of services during startup. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. • https://cert.vde.com/en/advisories/VDE-2024-022 • CWE-552: Files or Directories Accessible to External Parties •
CVE-2024-28137 – PHOENIX CONTACT: privilege escalation due to a TOCTOU vulnerability in the CHARX Series
https://notcve.org/view.php?id=CVE-2024-28137
A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability. Un atacante local con privilegios bajos puede realizar una escalada de privilegios con un script de inicio debido a una vulnerabilidad de TOCTOU. This vulnerability allows local attackers to escalate privileges on affected installations of Phoenix Contact CHARX SEC-3100 charging controllers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the /etc/init.d/user-applications script. By creating a symbolic link, an attacker can abuse the script to change ownership of arbitrary files. • https://cert.vde.com/en/advisories/VDE-2024-019 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •