A low privileged remote attacker can use a command injection vulnerability in the API which performs
remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2024-019 |
|
History
Fri, 24 Jan 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Fri, 24 Jan 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| CPEs | cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| Metrics |
ssvc
|
Fri, 24 Jan 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected. | A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected. |
Thu, 23 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
Status: PUBLISHED
Assigner: CERTVDE
Published: 2024-05-14T08:09:39.703Z
Updated: 2025-01-24T06:35:03.912Z
Reserved: 2024-03-05T08:10:25.697Z
Link: CVE-2024-28135
Updated: 2024-08-02T00:48:49.242Z
Status : Modified
Published: 2024-05-14T16:16:39.033
Modified: 2025-01-24T07:15:09.860
Link: CVE-2024-28135
No data.