Lucene search

K
zdiTobias Scharnowski (@ScepticCTF), Felix BuchmannZDI-24-857
HistoryJun 21, 2024 - 12:00 a.m.

(Pwn2Own) Phoenix Contact CHARX SEC-3100 Improper Access Control Firewall Bypass Vulnerability

2024-06-2100:00:00
Tobias Scharnowski (@ScepticCTF), Felix Buchmann
www.zerodayinitiative.com
2
network-adjacent
firewall rules
authentication bypass
source port
code execution

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.8%

This vulnerability allows network-adjacent attackers to bypass firewall rules and access another interface on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of firewall rules. The issue results from the use of rules that filter inbound traffic on the basis of the source port. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.8%