Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers
The CHARX SEC-3000, SEC-3050, SEC-3100, and SEC-3150 charge controllers contain two vulnerabilities: (1) the firewall service starts late in the boot sequence, leaving the device briefly exposed to unauthenticated network access during startup; (2) the device resets the administrator password to a default value when undergoing firmware upgrades, allowing an attacker who observes or triggers an upgrade to take control of the device. Both issues can lead to unauthorized device access and modification of charging operations.
- Network connectivity to the CHARX device port (IP-based access)
- For boot-sequence exploit: ability to send traffic during device startup
- For firmware reset exploit: ability to observe or trigger a firmware upgrade process
Patching may require device reboot — plan for process interruption
/api/v1/advisories/903fd8cc-3691-4340-a6b2-8d7f58420342Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.