CVE-2024-11666

Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users  suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:*

History

03 Dec 2024, 15:40

Type Values Removed Values Added
First Time Echarge salia Plcc Firmware
Echarge salia Plcc
Echarge
References () https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers - () https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers - Exploit, Third Party Advisory
CPE cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:*
Summary
  • (es) Los dispositivos afectados envían señales a la infraestructura en la nube de eCharge para preguntar si hay algún comando que deban ejecutar. Esta comunicación se establece a través de un canal inseguro, ya que la verificación entre pares está deshabilitada en todas partes. Por lo tanto, los usuarios remotos no autenticados ubicados adecuadamente en la red entre un controlador de cargador de vehículos eléctricos y la infraestructura de eCharge pueden ejecutar comandos arbitrarios con privilegios elevados en los dispositivos afectados. Este problema afecta a cph2_echarge_firmware: hasta la versión 2.0.4.

25 Nov 2024, 00:15

Type Values Removed Values Added
References
  • {'url': 'https://www.onekey.com/resource/not-all-ev-chargers-are-created-equal', 'source': 'research@onekey.com'}
  • () https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers -

24 Nov 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-24 23:15

Updated : 2024-12-03 15:40


NVD link : CVE-2024-11666

Mitre link : CVE-2024-11666

CVE.ORG link : CVE-2024-11666


JSON object : View

Products Affected

echarge

  • salia_plcc_firmware
  • salia_plcc
CWE
CWE-345

Insufficient Verification of Data Authenticity