Skip to main content

CVE-2025-25268: CWE-306 Missing Authentication for Critical Function in Phoenix Contact CHARX SEC-3150

High
VulnerabilityCVE-2025-25268cvecve-2025-25268cwe-306
Published: Tue Jul 08 2025 (07/08/2025, 07:00:27 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: CHARX SEC-3150

Description

An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:24:43 UTC

Technical Analysis

CVE-2025-25268 is a high-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, a product likely used in industrial or critical infrastructure environments. The vulnerability is classified under CWE-306, which indicates a missing authentication for a critical function. Specifically, an unauthenticated attacker with adjacent network access can send specially crafted requests to an API endpoint on the device, resulting in unauthorized read and write access to configuration settings. This lack of authentication means that the device does not verify the identity or privileges of the requester before allowing configuration changes, exposing it to potential manipulation. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The attack vector is adjacent network, meaning the attacker must be on the same local network or have access to a network segment that can reach the device's API. The vulnerability allows an attacker to alter device configurations, which could disrupt operations, cause denial of service, or facilitate further attacks within the network. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating this is a newly disclosed issue requiring immediate attention.

Potential Impact

For European organizations, especially those operating in industrial automation, energy, manufacturing, or critical infrastructure sectors, this vulnerability poses a significant risk. The CHARX SEC-3150 is likely deployed in environments where secure and reliable device configuration is critical. An attacker exploiting this vulnerability could alter device settings to disrupt operations, cause outages, or create backdoors for persistent access. This could lead to operational downtime, safety hazards, data breaches, and compliance violations under regulations such as NIS2 and GDPR if personal or operational data is compromised. The ability to modify configurations without authentication also increases the risk of sabotage or espionage, particularly in sectors like energy grids or manufacturing plants that are strategic targets in Europe. The adjacent network requirement limits remote exploitation but does not eliminate risk, as attackers could gain local network access through phishing, insider threats, or compromised devices.

Mitigation Recommendations

European organizations should immediately identify any deployments of the Phoenix Contact CHARX SEC-3150 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted personnel only. Implement strict access control lists (ACLs) and firewall rules to limit API endpoint accessibility to authorized management stations. Until a vendor patch is available, consider disabling or restricting API access if feasible. Monitor network traffic for unusual requests targeting the device’s API endpoints, and deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous configuration changes. Conduct regular audits of device configurations to detect unauthorized modifications promptly. Engage with Phoenix Contact for updates on patches or firmware upgrades addressing this vulnerability. Additionally, enhance physical security and employee awareness to reduce the risk of adjacent network compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-02-06T13:19:38.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cc4256f40f0eb72f2426a

Added to database: 7/8/2025, 7:09:25 AM

Last enriched: 7/8/2025, 7:24:43 AM

Last updated: 8/13/2025, 1:46:23 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats