A low privileged local attacker can leverage insecure permissions via SSH on the affected devices to escalate privileges to root.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Charx_sec-3000_firmware | Phoenixcontact | * | 1.7.3 (excluding) |