Lucene search

K
zdiTodd ManningZDI-24-523
HistoryMay 29, 2024 - 12:00 a.m.

Phoenix Contact CHARX SEC-3100 Link Following Local Privilege Escalation Vulnerability

2024-05-2900:00:00
Todd Manning
www.zerodayinitiative.com
5
local privilege escalation
phoenix contact
charx sec-3100
vulnerability
link following
arbitrary code execution
symbolic link
ownership change

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

This vulnerability allows local attackers to escalate privileges on affected installations of Phoenix Contact CHARX SEC-3100 charging controllers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the /etc/init.d/user-applications script. By creating a symbolic link, an attacker can abuse the script to change ownership of arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.3%

Related for ZDI-24-523