Article No° | Product Name | Affected Version(s) |
---|---|---|
CC612 | < 5.11.2 | |
CC612 | < 5.12.5 | |
CC612 | < 5.13.2 | |
CC612 | < 5.20.2 | |
CC613 | < 5.11.2 | |
CC613 | < 5.12.5 | |
CC613 | < 5.13.2 | |
CC613 | < 5.20.2 | |
ICC15xx | < 5.11.2 | |
ICC15xx | < 5.12.5 | |
ICC15xx | < 5.13.2 | |
ICC15xx | < 5.20.2 | |
ICC16xx | < 5.11.2 | |
ICC16xx | < 5.12.5 | |
ICC16xx | < 5.13.2 | |
ICC16xx | < 5.20.2 |
Bender is publishing this advisory to inform customers about multiple security vulnerabilities in the Charge Controller product families.
Bender has analysed the weaknesses and determined that the electrical safety of the devices is not concerned. To Benders knowledge, proof-of-concept code or exploits for the weaknesses are not available to the public.
Bender considers some weaknesses to be critical and thus need to be patched immediately. Therefore, patches are provided as maintenance branch versions 5.11.2, 5.12.5, 5.13.2 and 5.20.2. Future software releases will of course already include these patches.
The vulnerability allows a malicious entity to bypass credential check and escalate privileges.
Mitigation
Remediation
Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work.
Bender would also like to thank Qianxin StarV Security Lab, China.
The issue was coordinated by CERT@VDE.