1 results (0.002 seconds)

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

13 Aug 2024 — An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall. The issue results from incorrect ordering and synchronization of services during startup. An attack... • https://cert.vde.com/en/advisories/VDE-2024-022 • CWE-552: Files or Directories Accessible to External Parties •