An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://certvde.com/de/advisories/VDE-2025-019 |     | 
History
                    Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | epss 
 | epss 
 | 
Fri, 11 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Phoenixcontact Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware | |
| CPEs | cpe:2.3:h:phoenixcontact:charx_sec-3000:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3050:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3100:-:*:*:*:*:*:*:* cpe:2.3:h:phoenixcontact:charx_sec-3150:-:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products | Phoenixcontact Phoenixcontact charx Sec-3000 Phoenixcontact charx Sec-3000 Firmware Phoenixcontact charx Sec-3050 Phoenixcontact charx Sec-3050 Firmware Phoenixcontact charx Sec-3100 Phoenixcontact charx Sec-3100 Firmware Phoenixcontact charx Sec-3150 Phoenixcontact charx Sec-3150 Firmware | 
Tue, 08 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 08 Jul 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An unauthenticated adjacent attacker can modify configuration by sending specific requests to an API-endpoint resulting in read and write access due to missing authentication. | |
| Title | Unauthenticated Configuration Access via Exposed API Endpoint | |
| Weaknesses | CWE-306 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: CERTVDE
Published: 2025-07-08T07:00:27.103Z
Updated: 2025-07-08T14:29:11.096Z
Reserved: 2025-02-06T13:19:38.483Z
Link: CVE-2025-25268
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-07-08T14:23:37.404Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-07-08T07:15:24.693
Modified: 2025-07-11T14:37:03.430
Link: CVE-2025-25268
 Redhat
                        Redhat
                    No data.