Lucene search

K
vulnrichmentCERTVDEVULNRICHMENT:CVE-2024-26001
HistoryMar 12, 2024 - 8:12 a.m.

CVE-2024-26001 PHOENIX CONTACT: Out of bounds write only memory access

2024-03-1208:12:03
CWE-20
CERTVDE
github.com
4
out of bounds write
memory access
remote attacker
improper input validation
mqtt stack
brute force attack
memory randomization

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

An unauthenticated remote attacker can writeΒ memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*"
    ],
    "vendor": "phoenixcontact",
    "product": "charx_sec_3000",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.5.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*"
    ],
    "vendor": "phoenixcontact",
    "product": "charx_sec_3050",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.5.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*"
    ],
    "vendor": "phoenixcontact",
    "product": "charx_sec_3100",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.5.0"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*"
    ],
    "vendor": "phoenixcontact",
    "product": "charx_sec_3150",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.5.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

AI Score

7.1

Confidence

Low

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-26001