Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-20405 | A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root. |
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-014 |
|
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
|
| CPEs | cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Phoenixcontact
Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware |
Tue, 08 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 08 Jul 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root. | |
| Title | Privilege Escalation via Insecure SSH Permissions | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-07-08T14:29:19.578Z
Reserved: 2025-01-16T15:48:36.250Z
Link: CVE-2025-24006
Updated: 2025-07-08T14:23:39.660Z
Status : Analyzed
Published: 2025-07-08T07:15:24.493
Modified: 2025-07-11T14:36:03.460
Link: CVE-2025-24006
No data.
OpenCVE Enrichment
No data.
EUVD