Article No° | Product Name | Affected Version(s) |
---|---|---|
CHARX SEC-3000 | < 1.7.0 | |
CHARX SEC-3050 | < 1.7.0 | |
CHARX SEC-3100 | < 1.7.0 | |
CHARX SEC-3150 | < 1.7.0 |
Improper file permission handling allows an authenticated low privileged user to gain root access.
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.
This vulnerability allows the authenticated user "user-app" to gain root rights (privilege escalation).
Mitigation
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to General Recommendation.
Remediation
Phoenix Contact strongly recommends upgrading affected charge controllers to firmware version 1.7.0 or higher which fixes this vulnerability.
CERT@VDE coordinated with Phoenix Contact.
Finder: Tien Phan, Richard Jaletzki