June 21, 2024, 5 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.3. The following CVEs are assigned: CVE-2024-26288.

arbitrary code attackers authentication authentication bypass bypass bypass vulnerability code cve cve-2024 cves cvss devices encryption exploit missing network phoenix phoenix contact protocol pwn2own rating sec vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Watch Officer and Operations Officer

@ Interclypse | Arlington, VA, US

Sales Development Representative

@ Devo | United States

Principal Software Engineer

@ Oracle | Seattle, WA, United States

Engineering Manager, Cloud - TDIR (Remote)

@ CrowdStrike | USA CA Remote

Linux System Administrator II

@ Peraton | Fort Meade, MD, United States

Linux System Administrator

@ Peraton | Fort Meade, MD, United States