Unauthenticated Attacker Can Modify Device Configuration via File Write
CVE-2024-3913
5.9MEDIUM
Summary
An unauthenticated remote attacker can exploit this vulnerability to modify device configuration settings, taking advantage of a writable file that is accessible for a brief period following system startup. This weakness may allow unauthorized changes to critical configurations, potentially leading to further security risks and unauthorized access.
Affected Version(s)
CHARX SEC-3000 (1139022) 0.0.0 < 1.7.0
CHARX SEC-3050 (1139018) 0.0.0 < 1.7.0
CHARX SEC-3100 (1139012) 0.0.0 < 1.7.0
References
CVSS V3.1
Score:
5.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Alex Olson, "gadha"
Trend Micro's Zero Day Initiative