Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers

Plan PatchCVSS 8.8VDE-2024-070Jan 14, 2025
Phoenix Contact
Attack path
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

A file permission handling vulnerability in Phoenix Contact CHARX SEC-3000, SEC-3050, SEC-3100, and SEC-3150 charge controllers (firmware versions below 1.7.0) allows an authenticated low-privilege user to escalate privileges to root access on the device. This could allow unauthorized modification of charger settings, operation suspension, or other malicious actions on the EV charging infrastructure.

What this means
What could happen
An authenticated user with low privileges on a CHARX SEC charger could escalate to root access, allowing them to modify charging behavior, disrupt EV charging operations, or compromise the integrity of the charging infrastructure.
Who's at risk
EV charging operators, fleet managers, and facility managers responsible for Phoenix Contact CHARX SEC-3000, SEC-3050, SEC-3100, and SEC-3150 series charge controllers should apply this update. Any organization operating networked EV charging infrastructure with these devices is affected.
How it could be exploited
An attacker with legitimate low-privilege credentials (e.g., a service technician or local user account) could exploit improper file permission settings on the charge controller to escalate privileges to root level, gaining full control of the device and its charging functions.
Prerequisites
  • Valid low-privilege user account on the CHARX SEC device
  • Local or network access to the device (requires authentication to reach privilege escalation path)
Privilege escalation vulnerabilityRequires valid account but low privileges neededAffects critical charging infrastructureFile permission misconfiguration
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (4)
4 with fix
ProductAffected VersionsFix Status
CHARX SEC-3000<1.7.01.7.0
CHARX SEC-3050<1.7.01.7.0
CHARX SEC-3100<1.7.01.7.0
CHARX SEC-3150<1.7.01.7.0
Remediation & Mitigation
0/3
Do now
0/2
WORKAROUNDRestrict network access to CHARX SEC charge controllers using firewall rules; only allow connections from authorized management workstations and charging network systems
HARDENINGDisable or remove unnecessary user accounts on charge controllers; audit and restrict active low-privilege accounts to those absolutely required for operations
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpdate all CHARX SEC charge controllers (SEC-3000, SEC-3050, SEC-3100, SEC-3150) to firmware version 1.7.0 or higher
API: /api/v1/advisories/2da389d9-4e14-4620-8e9a-b403eb1d7b04

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.