CVE-2025-24002: CWE-20 Improper Input Validation in Phoenix Contact CHARX SEC-3150
An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.
AI Analysis
Technical Summary
CVE-2025-24002 is a medium-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 charging stations, which are compliant with the German Calibration Law. The vulnerability arises from improper input validation (CWE-20) in the handling of MQTT messages by the device. Specifically, an unauthenticated remote attacker can send crafted MQTT messages to the charging station, causing a service crash. This crash results in a temporary denial-of-service (DoS) condition, rendering the charging station non-operational until it is automatically restarted by an internal watchdog mechanism. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS v3.1 score is 5.3, reflecting ease of exploitation (network vector, no privileges or user interaction required) but limited impact scope and severity. No known exploits are currently reported in the wild, and no patches have been published yet. The affected product version is listed as 0.0.0, which likely indicates all current versions or an unspecified version. The vulnerability is significant because it targets charging infrastructure critical for electric vehicle (EV) operations, especially in Germany where calibration compliance is mandatory. The use of MQTT, a common IoT messaging protocol, expands the attack surface to network-exposed interfaces, increasing the risk of remote exploitation without authentication.
Potential Impact
For European organizations, particularly those operating EV charging infrastructure, this vulnerability poses a risk of service disruption. Charging stations affected by this flaw can be temporarily disabled remotely, causing inconvenience to EV users and potential financial losses for operators due to downtime. In critical infrastructure scenarios, such as public charging networks or fleet management, repeated or coordinated exploitation could degrade service reliability and customer trust. Although the impact is limited to availability and does not compromise data confidentiality or integrity, the disruption of charging services can have cascading effects on transportation and energy management systems. The fact that the vulnerability requires no authentication and can be triggered remotely increases the threat level, especially in environments where network segmentation or MQTT message filtering is insufficient. European organizations must consider the operational impact, regulatory compliance implications, and potential reputational damage resulting from service outages caused by this vulnerability.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement network-level controls to mitigate risk. This includes restricting MQTT traffic to trusted sources only, employing network segmentation to isolate charging station management interfaces from public or untrusted networks, and deploying MQTT message filtering or validation proxies to detect and block malformed or suspicious messages. Monitoring MQTT traffic for anomalies and implementing rate limiting can reduce the risk of DoS attempts. Additionally, organizations should ensure watchdog and automatic restart mechanisms are functioning correctly to minimize downtime. Engaging with Phoenix Contact for timely patch releases and applying updates promptly once available is critical. Furthermore, conducting regular security assessments of IoT and charging infrastructure, including penetration testing focused on MQTT interfaces, will help identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, Netherlands, Belgium, Austria, Switzerland, Sweden, Norway, Denmark
CVE-2025-24002: CWE-20 Improper Input Validation in Phoenix Contact CHARX SEC-3150
Description
An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.
AI-Powered Analysis
Technical Analysis
CVE-2025-24002 is a medium-severity vulnerability identified in the Phoenix Contact CHARX SEC-3150 charging stations, which are compliant with the German Calibration Law. The vulnerability arises from improper input validation (CWE-20) in the handling of MQTT messages by the device. Specifically, an unauthenticated remote attacker can send crafted MQTT messages to the charging station, causing a service crash. This crash results in a temporary denial-of-service (DoS) condition, rendering the charging station non-operational until it is automatically restarted by an internal watchdog mechanism. The vulnerability does not impact confidentiality or integrity but affects availability. The CVSS v3.1 score is 5.3, reflecting ease of exploitation (network vector, no privileges or user interaction required) but limited impact scope and severity. No known exploits are currently reported in the wild, and no patches have been published yet. The affected product version is listed as 0.0.0, which likely indicates all current versions or an unspecified version. The vulnerability is significant because it targets charging infrastructure critical for electric vehicle (EV) operations, especially in Germany where calibration compliance is mandatory. The use of MQTT, a common IoT messaging protocol, expands the attack surface to network-exposed interfaces, increasing the risk of remote exploitation without authentication.
Potential Impact
For European organizations, particularly those operating EV charging infrastructure, this vulnerability poses a risk of service disruption. Charging stations affected by this flaw can be temporarily disabled remotely, causing inconvenience to EV users and potential financial losses for operators due to downtime. In critical infrastructure scenarios, such as public charging networks or fleet management, repeated or coordinated exploitation could degrade service reliability and customer trust. Although the impact is limited to availability and does not compromise data confidentiality or integrity, the disruption of charging services can have cascading effects on transportation and energy management systems. The fact that the vulnerability requires no authentication and can be triggered remotely increases the threat level, especially in environments where network segmentation or MQTT message filtering is insufficient. European organizations must consider the operational impact, regulatory compliance implications, and potential reputational damage resulting from service outages caused by this vulnerability.
Mitigation Recommendations
Given the absence of an official patch, organizations should implement network-level controls to mitigate risk. This includes restricting MQTT traffic to trusted sources only, employing network segmentation to isolate charging station management interfaces from public or untrusted networks, and deploying MQTT message filtering or validation proxies to detect and block malformed or suspicious messages. Monitoring MQTT traffic for anomalies and implementing rate limiting can reduce the risk of DoS attempts. Additionally, organizations should ensure watchdog and automatic restart mechanisms are functioning correctly to minimize downtime. Engaging with Phoenix Contact for timely patch releases and applying updates promptly once available is critical. Furthermore, conducting regular security assessments of IoT and charging infrastructure, including penetration testing focused on MQTT interfaces, will help identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-01-16T15:48:36.249Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cc4256f40f0eb72f2425b
Added to database: 7/8/2025, 7:09:25 AM
Last enriched: 7/8/2025, 7:26:11 AM
Last updated: 8/14/2025, 6:42:34 PM
Views: 19
Related Threats
CVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.