Summary
Multiple vulnerabilities in the firmware of CHARX SEC-3xxx charging controllers have been discovered.
Update Version 1.1.0: Updated the reporting credits for CVE-2025-25271.
Impact
The vulnerabilities can lead to a total loss of confidentiality, integrity and availability of the devices.
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| CHARX SEC-3000 | Firmware <FW 1.7.3 | |
| CHARX SEC-3050 | Firmware <FW 1.7.3 | |
| CHARX SEC-3100 | Firmware <FW 1.7.3 | |
| CHARX SEC-3150 | Firmware <FW 1.7.3 |
Vulnerabilities
Expand / Collapse allCVE-2025-25270
CVE-2025-25271
CVE-2025-25268
CVE-2025-25269
Mitigation
Affected charging controllers are designed and developed for the use in closed industrial networks. Phoenix Contact therefore strongly recommends using the devices exclusively in closed networks and protected by a suitable firewall.
Remediation
Phoenix Contact strongly recommends to upgrade to firmware version 1.7.3 which fixes these vulnerabilities.
Acknowledgments
Phoenix Contact GmbH & Co. KG thanks the following parties for their efforts:
- CERTVDE for coordination. (see https://certvde.com/en/ )
- ZDI for coordination.
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 08.07.2025 12:00 | Initial Revision |
| 1.1.0 | 22.07.2025 10:00 | Updated the reporting credits for CVE-2025-25271. |