Lucene search

K
zdiNCC Group EDG (@nccgroupinfosec @_mccaulay @alexjplaskett)ZDI-24-856
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 Config Manager Improper Input Validation Remote Code Execution Vulnerability

2024-06-2100:00:00
NCC Group EDG (@nccgroupinfosec @_mccaulay @alexjplaskett)
www.zerodayinitiative.com
1
vulnerability
phoenix contact charx sec-3100
improper input validation
remote code execution
tcp port 5001
service account

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.0%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CharxSystemConfigManager service, which listens on TCP port 5001 by default. The issue results from the lack of proper validation of a user-supplied string before using it to update a configuration. An attacker can leverage this vulnerability to execute code in the context of the service account.

7.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.0%

Related for ZDI-24-856