CVE-2024-11666
Severity CVSS v4.0:
Pending analysis
Type:
CWE-345
Insufficient Verification of Data Authenticity
Publication date:
24/11/2024
Last modified:
03/12/2024
Description
Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices.<br />
<br />
This issue affects cph2_echarge_firmware: through 2.0.4.
Impact
Base Score 3.x
9.00
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:* | 2.0.4 (including) | |
cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page