Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34375 | An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2024-070 |
|
Tue, 14 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Jan 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access. | |
| Title | Phoenix Contact: CHARX-SEC3xxx Charge controllers vulnerable to privilege escalation | |
| Weaknesses | CWE-732 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-01-14T14:17:44.111Z
Reserved: 2024-11-20T10:45:49.608Z
Link: CVE-2024-11497
Updated: 2025-01-14T14:17:38.221Z
Status : Deferred
Published: 2025-01-14T14:15:27.720
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-11497
No data.
OpenCVE Enrichment
No data.
EUVD