Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47818 | A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2024-022 |
|
Fri, 22 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1188 |
Fri, 22 Aug 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1392 |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 23 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
|
| CPEs | cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
Tue, 13 Aug 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact
Phoenixcontact charx Sec 3000 Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| CPEs | cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact
Phoenixcontact charx Sec 3000 Phoenixcontact charx Sec 3050 Phoenixcontact charx Sec 3100 Phoenixcontact charx Sec 3150 |
|
| Metrics |
ssvc
|
Tue, 13 Aug 2024 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password. | |
| Title | Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password | |
| Weaknesses | CWE-1188 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-08-22T10:24:58.187Z
Reserved: 2024-07-16T12:18:00.312Z
Link: CVE-2024-6788
Updated: 2024-08-13T16:47:20.822Z
Status : Modified
Published: 2024-08-13T14:15:16.457
Modified: 2025-08-22T11:15:30.207
Link: CVE-2024-6788
No data.
OpenCVE Enrichment
No data.
EUVD