PHOENIX CONTACT: Multiple vulnerabilities in CHARX SEC charge controllers
Multiple vulnerabilities have been discovered in CHARX SEC charge controller firmware (versions 1.5.0 and earlier) affecting models SEC-3000, SEC-3050, SEC-3100, and SEC-3150. The vulnerabilities include cleartext transmission (CWE-319), missing input validation (CWE-20), buffer overflows (CWE-787), unrestricted file uploads (CWE-434), command injection (CWE-77), and others. These allow remote unauthenticated network-based exploitation without user interaction. Phoenix Contact has released firmware v1.5.1 that addresses these issues and recommends operating these network-capable devices in closed networks or behind suitable firewalls.
- Network reachability to the CHARX SEC device (direct or via shared network segment)
- No valid credentials required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0fd645e0-024b-47e3-b2df-ee1ac7875b53Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.