Lucene search

K
zdiSina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)ZDI-24-520
HistoryMay 29, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 Missing Encryption Authentication Bypass Vulnerability

2024-05-2900:00:00
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
www.zerodayinitiative.com
5
phoenix contact
charx sec-3100
missing encryption
authentication bypass
vulnerability
nginx
arbitrary code

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.7%

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of nginx. The issue results from a lack of encryption. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the user-app account.

7.5 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.7%

Related for ZDI-24-520