Zurück zur Übersicht

PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers

VDE-2024-011
Last update
12.03.2024 08:00
Published at
12.03.2024 08:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2024-011
CSAF Document

Summary

Multiple vulnerabilities have been discovered in the Firmware of CHARX SEC charge controllers. These vulnerabilities were discovered as part of a PWN2OWN competition initiated by Trend Micro Zero Day Initiative (ZDI).

Impact

CVE-2024-25994, CVE-2024-25996,CVE-2024-25997,CVE-2024-26000

These vulnerabilities can be exploited by a malicious attacker without local account to gain root privileges, which allows him to take over the device.

CVE-2024-26003

This vulnerability can be used by a malicious attacker without local account to perform remote code execution with the privileges of the ControllerAgent service.

Some of the Vulnerabilities represent a medium risk on their own, nevertheless chaining or combining these vulnerabilities can trigger an RCE that leads to the complete compromise of the device.

Affected Product(s)

Model no. Product name Affected versions
1139022 CHARX SEC-3000 Firmware <=1.5.0
1139018 CHARX SEC-3050 Firmware <=1.5.0
1139012 CHARX SEC-3100 Firmware <=1.5.0
1138965 CHARX SEC-3150 Firmware <=1.5.0

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Origin Validation Error (CWE-346)
Summary

An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.

References

Published
22.09.2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

References

Published
22.09.2025 14:57
Weakness
Out-of-bounds Write (CWE-787)
Summary

An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

References

Published
22.09.2025 14:57
Weakness
Cleartext Transmission of Sensitive Information (CWE-319)
Summary

An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.

References

Published
22.09.2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

An unauthenticated local attacker can perform a privilege escalation due to improper input validation in the OCPP agent service. 

References

Published
22.09.2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

An improper input validation in the Qualcom plctool allows a local attacker with low privileges to gain root access by changing the ownership of specific files.

References

Published
22.09.2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

References

Published
22.09.2025 14:57
Weakness
Out-of-bounds Read (CWE-125)
Summary

An unauthenticated remote attacker can DoS the control agent due to a out-of-bounds read which may prevent or disrupt the charging functionality. 

References

Published
22.09.2025 14:57
Weakness
Access of Uninitialized Pointer (CWE-824)
Summary

An unauthenticated remote attacker can DoS a control agent due to access of a uninitialized pointer which may prevent or disrupt the charging functionality.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)
Summary

An unauthenticated remote attacker can perform a command injection in the OCPP Service with limited privileges due to improper input validation.

References

Published
22.09.2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.

References

Published
22.09.2025 14:57
Weakness
Unrestricted Upload of File with Dangerous Type (CWE-434)
Summary

An unauthenticated remote attacker can upload a arbitrary script file due to improper input validation. The upload destination is fixed and is write only.

References

Published
22.09.2025 14:57
Weakness
Incomplete Cleanup (CWE-459)
Summary

An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS. 

References

Mitigation

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note.Measures to protect network-capable devices with Ethernet connection

Remediation

Phoenix Contact strongly recommends updating to firmware version v1.5.1, which fixes these vulnerabilities.

Revision History

Version Date Summary
1.0.0 12.03.2024 08:00 Initial revision.