VDE-2024-070
Last update
05/14/2025 15:00
Published at
01/14/2025 12:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2024-070
CSAF Document
Summary
Improper file permission handling allows an authenticated low privileged user to gain root access.
Impact
This vulnerability allows the authenticated user "user-app" to gain root rights (privilege escalation).
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1139022 | CHARX SEC-3000 | Firmware <1.7.0 |
1139018 | CHARX SEC-3050 | Firmware <1.7.0 |
1139012 | CHARX SEC-3100 | Firmware <1.7.0 |
1138965 | CHARX SEC-3150 | Firmware <1.7.0 |
Vulnerabilities
Expand / Collapse all
Published
09/22/2025 14:57
Severity
Weakness
Incorrect Permission Assignment for Critical Resource (CWE-732)
References
Mitigation
Phoenix Contact recommends operating network-capable devices in closed networks or
protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to General Recommendation.
Remediation
Phoenix Contact strongly recommends upgrading affected charge controllers to firmware
version 1.7.0 or higher which fixes this vulnerability.
Revision History
Version | Date | Summary |
---|---|---|
1 | 01/14/2025 12:00 | initial revision |
2 | 02/12/2025 17:48 | Fix: corrected self-reference, fixed version |
3 | 05/14/2025 15:00 | Fix: added distribution |