CVE-2024-11666
CVSS V2 None
CVSS V3 None
Description
Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices.
This issue affects cph2_echarge_firmware: through 2.0.4.
Overview
- CVE ID
- CVE-2024-11666
- Assigner
- ONEKEY
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-11-24T22:36:59.989Z
- Last Modified Date
- 2024-11-25T01:28:57.027Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://www.onekey.com/resource/critical-vulnerabilities-in-ev-charging-stations-analysis-of-echarge-controllers | third-party-advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-11666 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11666 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-11-25 13:13:57 | Added to TrackCVE |