Lucene search

K
zdiRET2 SystemsZDI-24-861
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 ClientSession Use-After-Free Remote Code Execution Vulnerability

2024-06-2100:00:00
RET2 Systems
www.zerodayinitiative.com
phoenix contact
charx sec-3100
clientsession
use-after-free
remote code execution
vulnerability
authentication
charxcontrolleragent service
arbitrary code execution

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of ClientSession objects in the CharxControllerAgent service. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the CharxControllerAgent service.

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

Related for ZDI-24-861