Unauthenticated Remote Attackers Can Extract Session Token and Gain Web-Based Management Access
CVE-2024-28134

7HIGH

Key Information:

Vendor
Phoenix Contact
Status
Charx Sec-3000
Charx Sec-3050
Charx Sec-3100
Charx Sec-3150
Vendor
CVE Published:
14 May 2024

Summary

An unauthenticated remote attacker has the capability to exploit a vulnerability that allows the extraction of session tokens through a Man-in-the-Middle (MitM) attack. This occurs due to the insecure cleartext transmission of sensitive data within the web-based management interface. The attacker can gain access with the same privileges as the currently logged-in user, without requiring any additional interaction from the user. While the attacker may only access non-sensitive information, this vulnerability can significantly compromise the availability of the affected product, as it exposes potential risks in web management functionalities.

Affected Version(s)

CHARX SEC-3000 0 <= 1.5.1

CHARX SEC-3050 0 <= 1.5.1

CHARX SEC-3100 0 <= 1.5.1

References

CVSS V3.1

Score:
7
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Trend Micro's Zero Day Initiative
Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)
.