Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27769: CWE-923: Improper Restriction of Communication Channel to Intended Endpoints in Siemens Heliox Flex 180 kW EV Charging Station

0
Low
VulnerabilityCVE-2025-27769cvecve-2025-27769cwe-923
Published: Tue Mar 10 2026 (03/10/2026, 16:07:43 UTC)
Source: CVE Database V5
Vendor/Project: Siemens
Product: Heliox Flex 180 kW EV Charging Station

Description

A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (All versions < F4.11.1), Heliox Mobile DC 40 kW EV Charging Station (All versions < L4.10.1). Affected devices contain improper access control that could allow an attacker to reach unauthorized services via the charging cable.

AI-Powered Analysis

AILast updated: 03/10/2026, 17:06:33 UTC

Technical Analysis

CVE-2025-27769 identifies a vulnerability in Siemens Heliox Flex 180 kW and Heliox Mobile DC 40 kW electric vehicle charging stations, specifically in versions prior to F4.11.1 and L4.10.1. The issue stems from improper restriction of communication channels (CWE-923), which means the devices do not adequately enforce access controls on the communication interfaces accessible via the charging cable. This flaw allows an attacker with physical access to the charging cable to reach unauthorized internal services that should be protected. The vulnerability does not require authentication or user interaction, increasing the risk of exploitation by anyone physically near the device. However, the attack vector is limited to physical proximity, and the CVSS 3.1 score is low (2.6), reflecting limited impact primarily on confidentiality with no direct impact on integrity or availability. The scope is considered changed (S:C) because the vulnerability could affect components beyond the initially intended communication endpoints. No patches or exploits are currently publicly available, but the issue highlights the importance of secure communication channel enforcement in EV charging infrastructure, which is critical for operational security and privacy. Siemens has reserved the CVE and published the vulnerability details, but no patch links are provided yet.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized access to internal services of Siemens EV charging stations, which could lead to information disclosure. While the confidentiality impact is low, exposure of sensitive operational data or configuration details could aid attackers in further attacks or reconnaissance. The lack of impact on integrity and availability means the charging stations' core functionality remains intact, reducing the risk of service disruption. However, given the growing deployment of EV infrastructure worldwide, any compromise of charging stations could undermine user trust and operational security. Organizations operating Siemens Heliox charging stations may face increased risk if attackers gain physical access to the charging cables, especially in public or semi-public locations. The vulnerability could also have regulatory implications if sensitive data is exposed. Overall, the threat is limited by the need for physical access and the low severity, but it should not be ignored due to the critical role of EV charging infrastructure in energy and transportation sectors.

Mitigation Recommendations

To mitigate CVE-2025-27769, organizations should implement strict physical security controls around Siemens Heliox EV charging stations to prevent unauthorized physical access to the charging cables. Deploying surveillance, access barriers, or secure enclosures can reduce the risk of exploitation. Siemens customers should monitor official communications for firmware updates addressing this vulnerability and apply patches promptly once available. Network segmentation of EV charging infrastructure can limit the exposure of internal services even if the communication channel is accessed. Additionally, organizations can conduct regular security assessments of their EV charging stations to detect unauthorized access attempts. Implementing logging and alerting mechanisms on the charging stations or associated management systems can help identify suspicious activities. Finally, educating staff and users about the risks of physical tampering with charging stations can enhance overall security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
siemens
Date Reserved
2025-03-06T16:53:49.577Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b04b8cea502d3aa873ba9d

Added to database: 3/10/2026, 4:49:16 PM

Last enriched: 3/10/2026, 5:06:33 PM

Last updated: 3/14/2026, 1:12:06 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses