A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by the watchdog.
References
Link | Resource |
---|---|
https://certvde.com/de/advisories/VDE-2025-014 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
11 Jul 2025, 14:36
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-08 07:15
Updated : 2025-07-11 14:36
NVD link : CVE-2025-24004
Mitre link : CVE-2025-24004
CVE.ORG link : CVE-2025-24004
JSON object : View
Products Affected
phoenixcontact
- charx_sec-3000
- charx_sec-3150
- charx_sec-3150_firmware
- charx_sec-3050
- charx_sec-3100_firmware
- charx_sec-3000_firmware
- charx_sec-3050_firmware
- charx_sec-3100
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')