Lucene search

K
zdiChris Anastasio @mufinnnnnnn & Fabius WatsonZDI-24-855
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 OCPP Protocol Improper Log Output Neutralization Remote Code Execution Vulnerability

2024-06-2100:00:00
Chris Anastasio @mufinnnnnnn & Fabius Watson
www.zerodayinitiative.com
phoenix contact
charx sec-3100
ocpp protocol
log output
neutralization
remote code execution

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

This vulnerability allows network-adjacent attackers to injection malicious content into log files on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of logging. The issue results from insufficient neutralization of special characters when writing to logs. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.

7.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%