Vulnerability Description
A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phoenixcontact | Charx Sec-3000 Firmware | <= 1.5.1 |
| Phoenixcontact | Charx Sec-3000 | - |
| Phoenixcontact | Charx Sec-3050 Firmware | <= 1.5.1 |
| Phoenixcontact | Charx Sec-3050 | - |
| Phoenixcontact | Charx Sec-3100 Firmware | <= 1.5.1 |
| Phoenixcontact | Charx Sec-3100 | - |
| Phoenixcontact | Charx Sec-3150 Firmware | <= 1.5.1 |
| Phoenixcontact | Charx Sec-3150 | - |
Related Weaknesses (CWE)
References
- https://cert.vde.com/en/advisories/VDE-2024-019Third Party Advisory
- https://cert.vde.com/en/advisories/VDE-2024-019Third Party Advisory
FAQ
What is CVE-2024-28136?
CVE-2024-28136 is a vulnerability with a CVSS score of 7.8 (HIGH). A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.
How severe is CVE-2024-28136?
CVE-2024-28136 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28136?
Check the references section above for vendor advisories and patch information. Affected products include: Phoenixcontact Charx Sec-3000 Firmware, Phoenixcontact Charx Sec-3000, Phoenixcontact Charx Sec-3050 Firmware, Phoenixcontact Charx Sec-3050, Phoenixcontact Charx Sec-3100 Firmware.