Skip to main content

CVE-2025-24004: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Phoenix Contact CHARX SEC-3150

Medium
VulnerabilityCVE-2025-24004cvecve-2025-24004cwe-120
Published: Tue Jul 08 2025 (07/08/2025, 06:59:32 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: CHARX SEC-3150

Description

A physical attacker with access to the device display via USB-C can send a message to the device which triggers an unsecure copy to a buffer resulting in loss of integrity and a temporary denial-of-service for the stations until they got restarted by the watchdog.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:25:58 UTC

Technical Analysis

CVE-2025-24004 is a medium-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, categorized under CWE-120, which pertains to classic buffer overflow issues. The vulnerability arises from an insecure buffer copy operation triggered when a physical attacker connects to the device's display interface via USB-C and sends a specially crafted message. This message causes an unchecked copy of data into a buffer, leading to a buffer overflow condition. The immediate consequence of this overflow is a loss of data integrity within the device and a temporary denial-of-service (DoS) state, where the affected stations become unresponsive until a watchdog timer forces a device restart. The vulnerability does not require prior authentication or user interaction, but physical access to the device's USB-C port is mandatory. The CVSS v3.1 score is 5.2, reflecting a medium severity level, with an attack vector classified as physical (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects integrity and availability but not confidentiality. No known exploits are currently reported in the wild, and no patches have been published yet. The affected version is listed as 0.0.0, which likely indicates all current versions or an unspecified version state at the time of reporting. This vulnerability is significant for operational technology environments where the CHARX SEC-3150 is deployed, as it can disrupt station operations temporarily and compromise system integrity through buffer overflow exploitation.

Potential Impact

For European organizations, particularly those in industrial automation, manufacturing, and critical infrastructure sectors relying on Phoenix Contact CHARX SEC-3150 devices, this vulnerability poses a risk of operational disruption. The temporary denial-of-service caused by the buffer overflow can halt station operations, potentially leading to production downtime, safety incidents, or delays in critical processes. The loss of integrity could also affect the reliability of system data or control commands, which is critical in industrial control systems (ICS). Although the attack requires physical access, environments with less stringent physical security or remote sites may be vulnerable to insider threats or unauthorized personnel accessing the USB-C interface. The impact on availability and integrity, even if temporary, can have cascading effects on supply chains and service delivery, especially in sectors like energy, transportation, and manufacturing prevalent in Europe. Given the medium severity and the lack of remote exploitation capability, the threat is moderate but should not be underestimated in environments where physical security is limited or where device uptime is critical.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict physical security controls around devices equipped with the CHARX SEC-3150, including restricted access to USB-C ports and monitoring of physical device interfaces. Deploy tamper-evident seals or enclosures to detect unauthorized access attempts. Network segmentation should be employed to isolate vulnerable devices from critical network segments to limit the impact of any device disruption. Organizations should also establish rigorous device monitoring and alerting to detect abnormal device behavior or unexpected restarts indicative of exploitation attempts. Until a vendor patch is available, consider disabling or physically blocking unused USB-C ports if feasible. Additionally, maintain up-to-date asset inventories to identify all affected devices and prioritize their protection. Engage with Phoenix Contact for timely updates or patches and plan for rapid deployment once available. Conduct regular security training for personnel to recognize and report suspicious physical access attempts. Finally, implement robust incident response procedures to quickly recover from any denial-of-service events caused by this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-01-16T15:48:36.250Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cc4256f40f0eb72f24261

Added to database: 7/8/2025, 7:09:25 AM

Last enriched: 7/8/2025, 7:25:58 AM

Last updated: 7/11/2025, 4:11:46 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats