Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25270: CWE-913 Improper Control of Dynamically-Managed Code Resources in Phoenix Contact CHARX SEC-3150

0
Critical
VulnerabilityCVE-2025-25270cvecve-2025-25270cwe-913
Published: Tue Jul 08 2025 (07/08/2025, 07:00:58 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: CHARX SEC-3150

Description

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:40:28 UTC

Technical Analysis

CVE-2025-25270 is a critical vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, which is a specialized industrial hardware product. The vulnerability is categorized under CWE-913, indicating improper control of dynamically-managed code resources. This flaw allows an unauthenticated remote attacker to alter the device configuration in such a way that they can achieve remote code execution (RCE) with root privileges. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 3.1 base score of 9.8 reflects the severity, with attack vector being network (AV:N), attack complexity low (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The root cause lies in insufficient validation or control over how dynamically-managed code resources are handled within the device’s configuration management, enabling attackers to inject or modify code execution paths. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the device’s critical role in industrial environments and the ease of exploitation. The lack of available patches at the time of publication further increases the risk profile.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a severe risk. The CHARX SEC-3150 is likely deployed in environments requiring high reliability and security, such as factory automation lines, power grid control systems, or transportation infrastructure. Successful exploitation could lead to full system compromise, allowing attackers to disrupt operations, steal sensitive operational data, or cause physical damage by manipulating industrial processes. The root-level access gained through this vulnerability means attackers could install persistent malware, disable safety mechanisms, or pivot to other network segments. Given the critical nature of these systems, such an attack could result in significant operational downtime, financial losses, regulatory penalties, and safety hazards. The unauthenticated nature of the attack vector increases the risk of widespread exploitation if the device is exposed to untrusted networks or insufficiently segmented environments.

Mitigation Recommendations

Immediate mitigation steps should include isolating the CHARX SEC-3150 devices from untrusted networks and restricting network access to trusted management stations only. Network segmentation and strict firewall rules should be enforced to limit exposure. Organizations should conduct thorough asset inventories to identify all affected devices. Since no patches are currently available, monitoring network traffic for anomalous configuration changes or unauthorized access attempts is critical. Implementing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tailored to this device may help detect exploitation attempts. Vendors and integrators should be contacted for any available firmware updates or workarounds. Additionally, organizations should review and harden device configurations, disable any unnecessary remote management interfaces, and enforce strong physical security controls to prevent local tampering. Planning for rapid deployment of patches once available is essential. Finally, incident response plans should be updated to address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-02-06T13:19:38.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cc7a96f40f0eb72f25235

Added to database: 7/8/2025, 7:24:25 AM

Last enriched: 7/8/2025, 7:40:28 AM

Last updated: 10/7/2025, 1:48:20 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats