Siemens VersiCharge AC Series EV Chargers
Siemens VersiCharge AC Series EV Chargers contain two vulnerabilities in default Modbus port access and M0 firmware validation. CVE-2025-31929 allows unauthenticated control of charger operations via Modbus TCP on port 502. CVE-2025-31930 allows arbitrary code execution by uploading malicious firmware without proper validation. Both affect dozens of single-phase (7.4 kW) and three-phase (22 kW) charger models in IEC, IEC ERK, and UL commercial/residential variants. Siemens has released firmware version 2.135 or later for some products; many models are marked as having no fix planned.
- Network access to Modbus TCP port 502 on the affected charger
- No authentication required for Modbus protocol access
- For firmware exploitation: ability to upload a file to the charger's firmware update interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6aecddca-0592-4ebe-a68a-b8fc8c7d8196Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.