CVE-2025-25271: CWE-1188 Insecure Default Initialization of Resource in Phoenix Contact CHARX SEC-3150
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.
AI Analysis
Technical Summary
CVE-2025-25271 is a high-severity vulnerability affecting the Phoenix Contact CHARX SEC-3150 device, which is a product likely used in electric vehicle charging infrastructure. The vulnerability is classified under CWE-1188, indicating an insecure default initialization of a resource. Specifically, the issue arises from insecure default settings in the device's configuration interface that allow an unauthenticated attacker located on an adjacent network segment to configure a new Open Charge Point Protocol (OCPP) backend. OCPP is a standardized protocol used for communication between electric vehicle charging stations and central management systems. By exploiting this vulnerability, an attacker can redirect or manipulate the charging station's backend communications without requiring any authentication or user interaction. The CVSS v3.1 score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed, but requiring adjacent network access. The vulnerability was published on July 8, 2025, and no known exploits are currently reported in the wild. The affected version is listed as 0.0.0, which likely indicates an initial or default firmware version. The root cause is insecure default initialization, meaning the device ships with configuration settings that expose the configuration interface without proper access controls, enabling unauthorized configuration changes. This can lead to full compromise of the charging station's communication backend, potentially allowing attackers to intercept, manipulate, or disrupt charging operations and data flows.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, utilities, and smart city deployments, this vulnerability poses significant risks. Compromise of the CHARX SEC-3150 devices could lead to unauthorized control over charging stations, enabling attackers to disrupt service availability, manipulate billing or usage data, or intercept sensitive information. This could undermine trust in EV infrastructure, cause financial losses, and impact critical energy management systems. Given the increasing adoption of electric vehicles and associated infrastructure across Europe, disruption or manipulation of charging stations could have cascading effects on transportation and energy sectors. Additionally, attackers could leverage compromised devices as footholds within industrial or critical infrastructure networks, potentially facilitating further lateral movement or attacks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of successful attacks in environments where network segmentation is insufficient. The impact on confidentiality, integrity, and availability is high, making this a critical concern for organizations managing or operating EV charging infrastructure in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify the firmware version of all Phoenix Contact CHARX SEC-3150 devices and apply any available vendor patches or firmware updates once released. Since no patch links are currently available, organizations should maintain close communication with Phoenix Contact for updates. 2) Implement strict network segmentation to isolate EV charging infrastructure from general enterprise and public networks, limiting adjacent network access to trusted administrators only. 3) Restrict access to the configuration interface using network-level controls such as firewalls, VLANs, or access control lists to prevent unauthorized adjacent attackers from reaching the device. 4) Monitor network traffic for anomalous configuration changes or unexpected OCPP backend reconfigurations, employing intrusion detection systems tailored to industrial protocols. 5) Enforce strong physical security controls to prevent unauthorized local network access near charging stations. 6) Conduct regular security audits and penetration testing focused on EV charging infrastructure to detect insecure default configurations or other vulnerabilities. 7) Develop incident response plans specific to EV infrastructure compromise scenarios to enable rapid containment and recovery. These steps go beyond generic advice by focusing on network isolation, monitoring, and operational controls tailored to the unique context of EV charging systems.
Affected Countries
Germany, France, Netherlands, Norway, United Kingdom, Sweden, Belgium
CVE-2025-25271: CWE-1188 Insecure Default Initialization of Resource in Phoenix Contact CHARX SEC-3150
Description
An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.
AI-Powered Analysis
Technical Analysis
CVE-2025-25271 is a high-severity vulnerability affecting the Phoenix Contact CHARX SEC-3150 device, which is a product likely used in electric vehicle charging infrastructure. The vulnerability is classified under CWE-1188, indicating an insecure default initialization of a resource. Specifically, the issue arises from insecure default settings in the device's configuration interface that allow an unauthenticated attacker located on an adjacent network segment to configure a new Open Charge Point Protocol (OCPP) backend. OCPP is a standardized protocol used for communication between electric vehicle charging stations and central management systems. By exploiting this vulnerability, an attacker can redirect or manipulate the charging station's backend communications without requiring any authentication or user interaction. The CVSS v3.1 score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed, but requiring adjacent network access. The vulnerability was published on July 8, 2025, and no known exploits are currently reported in the wild. The affected version is listed as 0.0.0, which likely indicates an initial or default firmware version. The root cause is insecure default initialization, meaning the device ships with configuration settings that expose the configuration interface without proper access controls, enabling unauthorized configuration changes. This can lead to full compromise of the charging station's communication backend, potentially allowing attackers to intercept, manipulate, or disrupt charging operations and data flows.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, utilities, and smart city deployments, this vulnerability poses significant risks. Compromise of the CHARX SEC-3150 devices could lead to unauthorized control over charging stations, enabling attackers to disrupt service availability, manipulate billing or usage data, or intercept sensitive information. This could undermine trust in EV infrastructure, cause financial losses, and impact critical energy management systems. Given the increasing adoption of electric vehicles and associated infrastructure across Europe, disruption or manipulation of charging stations could have cascading effects on transportation and energy sectors. Additionally, attackers could leverage compromised devices as footholds within industrial or critical infrastructure networks, potentially facilitating further lateral movement or attacks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of successful attacks in environments where network segmentation is insufficient. The impact on confidentiality, integrity, and availability is high, making this a critical concern for organizations managing or operating EV charging infrastructure in Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately verify the firmware version of all Phoenix Contact CHARX SEC-3150 devices and apply any available vendor patches or firmware updates once released. Since no patch links are currently available, organizations should maintain close communication with Phoenix Contact for updates. 2) Implement strict network segmentation to isolate EV charging infrastructure from general enterprise and public networks, limiting adjacent network access to trusted administrators only. 3) Restrict access to the configuration interface using network-level controls such as firewalls, VLANs, or access control lists to prevent unauthorized adjacent attackers from reaching the device. 4) Monitor network traffic for anomalous configuration changes or unexpected OCPP backend reconfigurations, employing intrusion detection systems tailored to industrial protocols. 5) Enforce strong physical security controls to prevent unauthorized local network access near charging stations. 6) Conduct regular security audits and penetration testing focused on EV charging infrastructure to detect insecure default configurations or other vulnerabilities. 7) Develop incident response plans specific to EV infrastructure compromise scenarios to enable rapid containment and recovery. These steps go beyond generic advice by focusing on network isolation, monitoring, and operational controls tailored to the unique context of EV charging systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-02-06T13:19:38.484Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686cc7a96f40f0eb72f25238
Added to database: 7/8/2025, 7:24:25 AM
Last enriched: 7/22/2025, 8:20:25 PM
Last updated: 8/8/2025, 8:57:19 PM
Views: 22
Related Threats
CVE-2025-55149: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ulab-uiuc tiny-scientist
MediumCVE-2025-55013: CWE-23: Relative Path Traversal in CybercentreCanada assemblyline
CriticalCVE-2025-55009: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in workos authkit-remix
HighCVE-2025-55008: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in workos authkit-react-router
HighCVE-2025-55006: CWE-20: Improper Input Validation in frappe lms
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.