Back to overview

Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers

VDE-2024-022
Last update
08/27/2025 12:00
Published at
08/13/2024 12:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2024-022
CSAF Document

Summary

Start sequence for firewall service allows attack during the boot process. Password is reset to default when the device undergoes a firmware upgrade.

Impact

These vulnerabilities may allow an attacker within the network to change the device configuration through an unauthenticated internal service before the firewall is started during boot process. The second vulnerability may allow an local attacker to use the firmware update feature to reset the user-app accounts password to the dafault value that is documented in the product documentation. The user "user-app" has limited access rights.

Affected Product(s)

Model no. Product name Affected versions
1139022 CHARX SEC-3000 Firmware <1.6.3
1139018 CHARX SEC-3050 Firmware <1.6.3
1139012 CHARX SEC-3100 Firmware <1.6.3
1138965 CHARX SEC-3150 Firmware <1.6.3

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Use of Default Credentials (CWE-1392)
References

Published
09/22/2025 14:58
Weakness
Files or Directories Accessible to External Parties (CWE-552)
References

Mitigation

Phoenix Contact recommends operating network-capable devices in closed networks or
protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to General Recommendation.

Remediation

Phoenix Contact strongly recommends upgrading affected charge controllers to firmware
version 1.6.3 or higher which fixes these vulnerabilities.

Revision History

Version Date Summary
1.0.0 08/13/2024 12:00 initial revision
1.0.1 03/14/2025 12:30 Fix: typo in version
1.0.2 05/22/2025 15:03 Fix: added distribution, quotation mark
1.1.2 08/27/2025 12:00 Update: CWE from CVE-2024-6788, Revision History