Back to overview

Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers

VDE-2025-074
Last update
10/14/2025 12:00
Published at
10/14/2025 12:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2025-074
CSAF Document

Summary

A vulnerability in the firmware of CHARX SEC-3xxx charging controllers have been discovered.

Impact

The vulnerability can lead to a total loss of confidentiality, integrity and availability of the devices.

Affected Product(s)

Model no. Product name Affected versions
1139022 CHARX SEC-3000 Firmware < FW 1.7.4
1139018 CHARX SEC-3050 Firmware < FW 1.7.4
1138965 CHARX SEC-3150 Firmware < FW 1.7.4
1139012 CHARX SEC-3150 Firmware < FW 1.7.4

Vulnerabilities

Expand / Collapse all

Published
10/14/2025 15:00
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

An low privileged remote attacker with an account for the Web-based management can change the system configuration to perform a command injection as root, resulting in a total loss of confidentiality, availability and integrity due to improper control of generation of code ('Code Injection').

References

Mitigation

Affected charging controllers are designed and developed for the use in closed industrial networks. Phoenix Contact therefore strongly recommends using the devices exclusively in closed networks and protected by a suitable firewall.

Remediation

Phoenix Contact strongly recommends to upgrade to firmware version 1.7.4 which fixes vulnerability CVE-2025-41699

Acknowledgments

Phoenix Contact GmbH & Co. KG thanks the following parties for their efforts:

Revision History

Version Date Summary
1 07/08/2025 12:00 Initial Revision