Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers
Multiple vulnerabilities exist in Phoenix Contact CHARX SEC-3xxx charging controller firmware versions 1.6.5 and earlier. CVE-2025-24005 and CVE-2025-24006 are remotely exploitable via network without authentication and can cause integrity issues (altered charging behavior) and high availability impact (denial of service). Input validation flaws (CWE-20) and buffer overflow issues (CWE-120) allow unauthenticated network attackers to send malicious input. Three additional vulnerabilities (CVE-2025-24002, CVE-2025-24003, CVE-2025-24004) affecting Eichrecht metering compliance have no vendor fix planned. Phoenix Contact recommends upgrading to firmware 1.7.3 for CVE-2025-24005 and 24006, and operating these devices in closed networks protected by firewalls.
- Network access to the CHARX SEC-3xxx device (typically port 80/443 for web interface or proprietary charging protocol port)
- Device running vulnerable firmware version 1.6.5 or earlier (or any version before 1.7.3 for CVE-2025-24005/24006)
- No authentication required to send malicious input
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8053d184-8d2c-4fb4-b91e-7ee221ea48c5Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.