CVE-2025-25268: CWE-306 Missing Authentication for Critical Function in Phoenix Contact CHARX SEC-3150
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
AI Analysis
Technical Summary
CVE-2025-25268 is a high-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, a product likely used in industrial or critical infrastructure environments. The vulnerability is classified under CWE-306, which indicates a missing authentication for a critical function. Specifically, an unauthenticated attacker with adjacent network access can send specially crafted requests to an API endpoint on the device, resulting in unauthorized read and write access to configuration settings. This lack of authentication means that the device does not verify the identity or privileges of the requester before allowing configuration changes, exposing it to potential manipulation. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The attack vector is adjacent network, meaning the attacker must be on the same local network or have access to a network segment that can reach the device's API. The vulnerability allows an attacker to alter device configurations, which could disrupt operations, cause denial of service, or facilitate further attacks within the network. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating this is a newly disclosed issue requiring immediate attention.
Potential Impact
For European organizations, especially those operating in industrial automation, energy, manufacturing, or critical infrastructure sectors, this vulnerability poses a significant risk. The CHARX SEC-3150 is likely deployed in environments where secure and reliable device configuration is critical. An attacker exploiting this vulnerability could alter device settings to disrupt operations, cause outages, or create backdoors for persistent access. This could lead to operational downtime, safety hazards, data breaches, and compliance violations under regulations such as NIS2 and GDPR if personal or operational data is compromised. The ability to modify configurations without authentication also increases the risk of sabotage or espionage, particularly in sectors like energy grids or manufacturing plants that are strategic targets in Europe. The adjacent network requirement limits remote exploitation but does not eliminate risk, as attackers could gain local network access through phishing, insider threats, or compromised devices.
Mitigation Recommendations
European organizations should immediately identify any deployments of the Phoenix Contact CHARX SEC-3150 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted personnel only. Implement strict access control lists (ACLs) and firewall rules to limit API endpoint accessibility to authorized management stations. Until a vendor patch is available, consider disabling or restricting API access if feasible. Monitor network traffic for unusual requests targeting the device’s API endpoints, and deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous configuration changes. Conduct regular audits of device configurations to detect unauthorized modifications promptly. Engage with Phoenix Contact for updates on patches or firmware upgrades addressing this vulnerability. Additionally, enhance physical security and employee awareness to reduce the risk of adjacent network compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-25268: CWE-306 Missing Authentication for Critical Function in Phoenix Contact CHARX SEC-3150
Description
An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-25268 is a high-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, a product likely used in industrial or critical infrastructure environments. The vulnerability is classified under CWE-306, which indicates a missing authentication for a critical function. Specifically, an unauthenticated attacker with adjacent network access can send specially crafted requests to an API endpoint on the device, resulting in unauthorized read and write access to configuration settings. This lack of authentication means that the device does not verify the identity or privileges of the requester before allowing configuration changes, exposing it to potential manipulation. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed. The attack vector is adjacent network, meaning the attacker must be on the same local network or have access to a network segment that can reach the device's API. The vulnerability allows an attacker to alter device configurations, which could disrupt operations, cause denial of service, or facilitate further attacks within the network. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating this is a newly disclosed issue requiring immediate attention.
Potential Impact
For European organizations, especially those operating in industrial automation, energy, manufacturing, or critical infrastructure sectors, this vulnerability poses a significant risk. The CHARX SEC-3150 is likely deployed in environments where secure and reliable device configuration is critical. An attacker exploiting this vulnerability could alter device settings to disrupt operations, cause outages, or create backdoors for persistent access. This could lead to operational downtime, safety hazards, data breaches, and compliance violations under regulations such as NIS2 and GDPR if personal or operational data is compromised. The ability to modify configurations without authentication also increases the risk of sabotage or espionage, particularly in sectors like energy grids or manufacturing plants that are strategic targets in Europe. The adjacent network requirement limits remote exploitation but does not eliminate risk, as attackers could gain local network access through phishing, insider threats, or compromised devices.
Mitigation Recommendations
European organizations should immediately identify any deployments of the Phoenix Contact CHARX SEC-3150 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted personnel only. Implement strict access control lists (ACLs) and firewall rules to limit API endpoint accessibility to authorized management stations. Until a vendor patch is available, consider disabling or restricting API access if feasible. Monitor network traffic for unusual requests targeting the device’s API endpoints, and deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous configuration changes. Conduct regular audits of device configurations to detect unauthorized modifications promptly. Engage with Phoenix Contact for updates on patches or firmware upgrades addressing this vulnerability. Additionally, enhance physical security and employee awareness to reduce the risk of adjacent network compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-02-06T13:19:38.483Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cc4256f40f0eb72f2426a
Added to database: 7/8/2025, 7:09:25 AM
Last enriched: 7/8/2025, 7:24:43 AM
Last updated: 8/13/2025, 1:46:23 PM
Views: 24
Related Threats
CVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52619: CWE-209 Generation of Error Message Containing Sensitive Information in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52618: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in HCL Software BigFix SaaS Remediate
MediumCVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.