phoenix contact Latest Vulnerabilities
Latest vulnerabilities published by phoenix contact
Vulnerability Published:
ποΈ Published
- Anytime
Sort By:
ποΈ Published Date
- Descending
Low Privileged Remote Attackers Can Cause DoS Through Config Changes
CVE-2024-43393Phoenix ContactFl Mguard 21028.1HIGHLow Privilege Attackers Can Cause Denial of Service Through Configuration Changes
CVE-2024-43392Phoenix ContactFl Mguard 21028.1HIGHLow Privilege Attacker Can Conduct Configuration Changes Leading to Denial of Service
CVE-2024-43391Phoenix ContactFl Mguard 21028.1HIGHLow Privileged Remote Attackers Can Cause Denial of Service (DoS) Through Configuration Changes of the Firewall Service
CVE-2024-43390Phoenix ContactFl Mguard 21028.1HIGHLow Privileged Remote Attacker Can Perform Configuration Changes Leading to DoS via OSPF_INTERFACE.SIMPLE_KEY and OSPF_INTERFACE.DIGEST_KEY
CVE-2024-43389Phoenix ContactFl Mguard 21028.1HIGHLow Privilege Attack on SNMP Service via Improper Input Validation
CVE-2024-43388Phoenix ContactFl Mguard 21028.8HIGHLow Privileged User Can Read and Write Files as Root Due to Improper Neutralization of Special Elements in mGuard Devices
CVE-2024-43387Phoenix ContactFl Mguard 21028.8HIGHLow Privileged Attack Can Trigger Execution of Arbitrary OS Commands as Root in mGuard Devices
CVE-2024-43386Phoenix ContactFl Mguard 21028.8HIGHmGuard Devices Vulnerable to Arbitrary OS Command Execution via Proxy HTTP Port
CVE-2024-43385Phoenix ContactFl Mguard 21028.8HIGHLow privileged attackers gain root access through user data prone to special element neutralization
CVE-2024-7699Phoenix ContactFl Mguard 21028.8HIGHLow Privileged Remote Attacker Can Abuse CSRF Tokens of Higher Privileged Users
CVE-2024-7698Phoenix ContactFl Mguard 21025.7MEDIUMHigh Number of TCP Connections Can Lead to Valid IPsec VPN Peers Blocking
CVE-2024-7734Phoenix ContactFl Mguard 21025.3MEDIUMDefault Password Vulnerability in LAN Interface Could Allow Remote Reset of User Account
CVE-2024-6788Phoenix ContactCharx Sec-30009.8CRITICALUnauthenticated Attacker Can Modify Device Configuration via File Write
CVE-2024-3913Phoenix ContactCharx Sec-3000 (1139022)5.9MEDIUMPrivilege Escalation Vulnerability in Initi Script
CVE-2024-28137Phoenix ContactCharx Sec-30007.8HIGHCommand Injection Vulnerability Can Lead to Root Privileges
CVE-2024-28136Phoenix ContactCharx Sec-30007.8HIGHLow Privileged Remote Attacker Can Execute Code as User-App User Due to Input Validation Flaw
CVE-2024-28135Phoenix ContactCharx Sec-30005MEDIUMUnauthenticated Remote Attackers Can Extract Session Token and Gain Web-Based Management Access
CVE-2024-28134Phoenix ContactCharx Sec-30007HIGHLocal Low Privileged Attacker Can Use Untrusted Search Path to Gain Root Privileges
CVE-2024-28133Phoenix ContactCharx Sec-30007.8HIGHUnencrypted Data Vulnerable to Interception
CVE-2024-26288Phoenix ContactCharx Sec-30008.7HIGHUnauthenticated Remote Attackers Can Gain Service Level Privileges Through Incomplete Cleanup During Service Restart After DoS
CVE-2024-26005Phoenix ContactCharx Sec-30004.8MEDIUMUninitialized Pointer DoS Attack Affects Control Agent
CVE-2024-26004Phoenix ContactCharx Sec-30007.5HIGHUnauthenticated Remote Attack Can Cause Denial of Service (DoS) Against Charging Functionality
CVE-2024-26003Phoenix ContactCharx Sec-30007.5HIGHQualcomm plctool Vulnerability Allows Local Attacker with Low Privileges to Gain Root Access
CVE-2024-26002Phoenix ContactCharx Sec-30007.8HIGHUnauthenticated Remote Attackers Can Write Memory Out of Bounds Due to Input Validation Flaw in MQTT Stack
CVE-2024-26001Phoenix ContactCharx Sec-30009.8CRITICAL