Vulnerability Details CVE-2024-6788
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.014
EPSS Ranking 79.7%
CVSS Severity
CVSS v3 Score 8.6
Products affected by CVE-2024-6788
-
cpe:2.3:h:phoenixcontact:charx_sec-3000:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3050:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3100:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3150:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.2