Summary
Multiple vulnerabilities have been discovered in the Firmware of CHARX SEC charge controllers.
Update: credis have been updated
Impact
CVE-2024-28137: The exploit allows a local user to gain root privileges, which allows them to take over the device.
CVE-2024-28134: The exploit allows an attacker without local account to get access to the web-basedmanagement with the privileges of the currently logged in user.
CVE-2024-28135: The exploit allows a user of the web-based management to perform remote code execution on the device as a user with low privileges.
CVE-2024-28133: The exploit allows a local user on the device to perform privilege escalation to gain rootprivileges.
CVE-2024-28136: When the OCPP management port is opened, the exploit allows an attacker without localaccount to gain root privileges and perform remote code execution.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1139022 | CHARX SEC-3000 | Firmware <=1.5.1 |
1139018 | CHARX SEC-3050 | Firmware <=1.5.1 |
1139012 | CHARX SEC-3100 | Firmware <=1.5.1 |
1138965 | CHARX SEC-3150 | Firmware <=1.5.1 |
Vulnerabilities
Expand / Collapse allA local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root
privileges.
A local attacker with low privileges can use a command injection vulnerability to gain root
privileges due to improper input validation using the OCPP Remote service.
A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.
An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based
management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected.
A low privileged remote attacker can use a command injection vulnerability in the API which performs
remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
Mitigation
Phoenix Contact recommends operating network-capable devices in closed networks orprotected with a suitable firewall. For detailed information on our recommendations for measuresto protect network-capable devices, please refer to our application note.
Measures to protect network-capable devices with Ethernet connection
Remediation
PHOENIX CONTACT strongly recommends upgrading affected charge controllers to firmware version 1.6 which fixes these vulnerabilities.
Revision History
Version | Date | Summary |
---|---|---|
1 | 14.05.2024 08:00 | Initial revision. |