Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32481 | An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2024-022 |
|
Wed, 29 Jan 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 13 Sep 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
|
| CPEs | cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
Tue, 13 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact
Phoenixcontact charx Sec 3000 Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| CPEs | cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact
Phoenixcontact charx Sec 3000 Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. | |
| Title | Phoenix Contact: Start sequence allows attack during the boot process | |
| Weaknesses | CWE-552 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-01-29T06:04:51.452Z
Reserved: 2024-04-17T07:09:02.592Z
Link: CVE-2024-3913
Updated: 2024-08-13T13:56:49.342Z
Status : Undergoing Analysis
Published: 2024-08-13T13:15:12.750
Modified: 2025-01-29T06:15:30.670
Link: CVE-2024-3913
No data.
OpenCVE Enrichment
No data.
EUVD