Lucene search

K
zdiMidnight Blue / PHP HooligansZDI-24-862
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 MQTT Protocol JSON Parsing Buffer Overflow Remote Code Execution Vulnerability

2024-06-2100:00:00
Midnight Blue / PHP Hooligans
www.zerodayinitiative.com
8
network-adjacent attackers
arbitrary code execution
authentication bypass
json-encoded arrays
user-supplied data
buffer overflow
charx-ea user

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

30.2%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of JSON-encoded arrays. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to execute code in the context of the charx-ea user.

AI Score

7.2

Confidence

High

EPSS

0.001

Percentile

30.2%