Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers

Plan PatchCVSS 9.8VDE-2025-019Jul 8, 2025
Phoenix Contact
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

Multiple vulnerabilities in CHARX SEC-3xxx charging controller firmware allow unauthenticated remote code execution and command injection via network access. Affected models are CHARX SEC-3150, SEC-3050, and SEC-3000. The vulnerabilities stem from missing input validation and insufficient access controls (CWE-306, CWE-78, CWE-913, CWE-1188).

What this means
What could happen
An attacker with network access to a CHARX SEC charging controller could execute arbitrary commands or modify charging parameters without authentication, potentially disrupting EV charging operations or causing physical equipment damage.
Who's at risk
This affects facilities operating Phoenix Contact CHARX SEC-3xxx charging controllers for EV charging stations. Water utilities with EV fleet charging infrastructure and municipal electric utilities with public charging networks should prioritize updates. Charging station operators and facilities managers responsible for EV infrastructure are most directly impacted.
How it could be exploited
An attacker on the network sends a crafted command to the controller's network interface. The device lacks proper input validation and authentication controls, allowing the attacker to execute operating system commands or alter charging logic directly.
Prerequisites
  • Network connectivity to the CHARX SEC controller on its management or operational port
  • No authentication bypass required
remotely exploitableno authentication requiredlow complexityhigh CVSS (9.8)
Exploitability
Some exploitation risk — EPSS score 1.1%
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
CHARX SEC-3150<FW 1.7.3FW 1.7.3
CHARX SEC-3050<FW 1.7.3FW 1.7.3
CHARX SEC-3000<FW 1.7.3FW 1.7.3
Remediation & Mitigation
0/3
Do now
0/1
WORKAROUNDRestrict network access to CHARX SEC controller management interfaces using firewall rules—limit to authorized engineering workstations and control systems only
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

CHARX SEC-3150
HOTFIXUpgrade CHARX SEC-3150, SEC-3050, and SEC-3000 controllers to firmware version 1.7.3 or later
Long-term hardening
0/1
HARDENINGIsolate CHARX SEC controllers on a dedicated industrial network segment, separate from general IT networks and untrusted systems
API: /api/v1/advisories/6543eaf6-a9c4-48e1-b91c-5bf978279087

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | CVSS 9.8 - OTPulse