Skip to main content

CVE-2025-48414: CWE-798 Use of Hard-coded Credentials in eCharge Hardy Barth cPH2 / cPP2 charging stations

Medium
VulnerabilityCVE-2025-48414cvecve-2025-48414cwe-798
Published: Wed May 21 2025 (05/21/2025, 11:40:50 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2 / cPP2 charging stations

Description

There are several scripts in the web interface that are accessible via undocumented hard-coded credentials. The scripts provide access to additional administrative/debug functionality and are likely intended for debugging during development and provides an additional attack surface.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:57:04 UTC

Technical Analysis

CVE-2025-48414 is a medium-severity vulnerability identified in eCharge Hardy Barth's cPH2 and cPP2 electric vehicle charging stations, specifically in firmware versions up to 2.2.0. The vulnerability arises from the presence of hard-coded credentials embedded within several scripts accessible through the device's web interface. These credentials are undocumented and likely intended for debugging or administrative purposes during development but were not removed or properly secured before release. The scripts accessible via these credentials expose additional administrative and debug functionalities, thereby expanding the attack surface of the charging stations. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects confidentiality and integrity, as unauthorized actors could gain access to administrative functions, potentially leading to unauthorized configuration changes or data exposure. However, availability is not directly impacted. No known exploits are currently reported in the wild, but the presence of hard-coded credentials is a well-known security anti-pattern that can be leveraged by attackers to gain persistent unauthorized access. Given the critical role of EV charging infrastructure in energy and transportation sectors, exploitation could have operational and reputational consequences.

Potential Impact

For European organizations, especially those operating or managing EV charging infrastructure, this vulnerability poses a significant risk. Unauthorized access to charging stations could allow attackers to manipulate charging operations, disrupt service availability indirectly, or harvest sensitive operational data. This could affect utilities, commercial charging networks, and public infrastructure providers, potentially undermining trust in EV infrastructure reliability. Furthermore, compromised charging stations could be used as footholds within broader operational technology (OT) or industrial control system (ICS) networks, increasing the risk of lateral movement and more extensive attacks. Given the increasing adoption of EVs and the EU's push for sustainable transportation, the affected devices are likely deployed across multiple countries, amplifying the potential impact. Confidentiality breaches could expose user data or operational parameters, while integrity violations could lead to unauthorized changes in charging behavior or firmware, potentially causing safety or financial issues.

Mitigation Recommendations

Organizations should prioritize updating affected charging stations to firmware versions beyond 2.2.0 once patches become available. In the absence of official patches, immediate mitigations include restricting network access to the charging stations' management interfaces by implementing network segmentation and firewall rules that limit access to trusted administrators only. Monitoring network traffic for unusual access patterns to the web interface scripts can help detect exploitation attempts. Additionally, organizations should conduct thorough audits of deployed devices to identify those running vulnerable firmware versions. Where possible, disable or remove debug and administrative scripts that are not required for normal operation. Vendors should be engaged to provide secure firmware updates and guidance on securely managing device credentials. Finally, integrating these devices into a broader security monitoring framework will help detect and respond to potential compromises swiftly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-05-20T07:34:22.865Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dbe9bc4522896dcbfc038

Added to database: 5/21/2025, 11:52:59 AM

Last enriched: 7/6/2025, 4:57:04 AM

Last updated: 8/13/2025, 8:28:09 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats