Skip to main content

CVE-2025-25270: CWE-913 Improper Control of Dynamically-Managed Code Resources in Phoenix Contact CHARX SEC-3150

Critical
VulnerabilityCVE-2025-25270cvecve-2025-25270cwe-913
Published: Tue Jul 08 2025 (07/08/2025, 07:00:58 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: CHARX SEC-3150

Description

An unauthenticated remote attacker can alter the device configuration in a way to get remote code execution as root with specific configurations.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:40:28 UTC

Technical Analysis

CVE-2025-25270 is a critical vulnerability identified in the Phoenix Contact CHARX SEC-3150 device, which is a specialized industrial hardware product. The vulnerability is categorized under CWE-913, indicating improper control of dynamically-managed code resources. This flaw allows an unauthenticated remote attacker to alter the device configuration in such a way that they can achieve remote code execution (RCE) with root privileges. The vulnerability requires no authentication or user interaction, making it highly exploitable over the network. The CVSS 3.1 base score of 9.8 reflects the severity, with attack vector being network (AV:N), attack complexity low (AC:L), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The root cause lies in insufficient validation or control over how dynamically-managed code resources are handled within the device’s configuration management, enabling attackers to inject or modify code execution paths. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the device’s critical role in industrial environments and the ease of exploitation. The lack of available patches at the time of publication further increases the risk profile.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a severe risk. The CHARX SEC-3150 is likely deployed in environments requiring high reliability and security, such as factory automation lines, power grid control systems, or transportation infrastructure. Successful exploitation could lead to full system compromise, allowing attackers to disrupt operations, steal sensitive operational data, or cause physical damage by manipulating industrial processes. The root-level access gained through this vulnerability means attackers could install persistent malware, disable safety mechanisms, or pivot to other network segments. Given the critical nature of these systems, such an attack could result in significant operational downtime, financial losses, regulatory penalties, and safety hazards. The unauthenticated nature of the attack vector increases the risk of widespread exploitation if the device is exposed to untrusted networks or insufficiently segmented environments.

Mitigation Recommendations

Immediate mitigation steps should include isolating the CHARX SEC-3150 devices from untrusted networks and restricting network access to trusted management stations only. Network segmentation and strict firewall rules should be enforced to limit exposure. Organizations should conduct thorough asset inventories to identify all affected devices. Since no patches are currently available, monitoring network traffic for anomalous configuration changes or unauthorized access attempts is critical. Implementing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tailored to this device may help detect exploitation attempts. Vendors and integrators should be contacted for any available firmware updates or workarounds. Additionally, organizations should review and harden device configurations, disable any unnecessary remote management interfaces, and enforce strong physical security controls to prevent local tampering. Planning for rapid deployment of patches once available is essential. Finally, incident response plans should be updated to address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-02-06T13:19:38.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686cc7a96f40f0eb72f25235

Added to database: 7/8/2025, 7:24:25 AM

Last enriched: 7/8/2025, 7:40:28 AM

Last updated: 7/8/2025, 10:14:38 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats