Description
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Published: 2024-08-13
Score: 8.6 High
EPSS: 3.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47818 A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
History

Fri, 22 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1188

Fri, 22 Aug 2025 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1392

Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01075}

epss

{'score': 0.01418}


Thu, 23 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware
CPEs cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:*
Vendors & Products Phoenixcontact charx Sec-3000
Phoenixcontact charx Sec-3000 Firmware
Phoenixcontact charx Sec-3050
Phoenixcontact charx Sec-3050 Firmware
Phoenixcontact charx Sec-3100
Phoenixcontact charx Sec-3100 Firmware
Phoenixcontact charx Sec-3150
Phoenixcontact charx Sec-3150 Firmware

Tue, 13 Aug 2024 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Phoenixcontact
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050
Phoenixcontact charx Sec 3100
Phoenixcontact charx Sec 3150
CPEs cpe:2.3:a:phoenixcontact:charx_sec_3000:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3050:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3100:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:charx_sec_3150:*:*:*:*:*:*:*:*
Vendors & Products Phoenixcontact
Phoenixcontact charx Sec 3000
Phoenixcontact charx Sec 3050
Phoenixcontact charx Sec 3100
Phoenixcontact charx Sec 3150
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 13:30:00 +0000

Type Values Removed Values Added
Description A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Title Phoenix Contact: update feature from CHARX controller can be used to reset a low privilege user password
Weaknesses CWE-1188
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}


Subscriptions

Phoenixcontact Charx Sec-3000 Charx Sec-3000 Firmware Charx Sec-3050 Charx Sec-3050 Firmware Charx Sec-3100 Charx Sec-3100 Firmware Charx Sec-3150 Charx Sec-3150 Firmware Charx Sec 3000 Charx Sec 3050 Charx Sec 3100 Charx Sec 3150
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-08-22T10:24:58.187Z

Reserved: 2024-07-16T12:18:00.312Z

Link: CVE-2024-6788

cve-icon Vulnrichment

Updated: 2024-08-13T16:47:20.822Z

cve-icon NVD

Status : Modified

Published: 2024-08-13T14:15:16.457

Modified: 2025-08-22T11:15:30.207

Link: CVE-2024-6788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses