CVE-2025-48417: CWE-321 Use of Hard-coded Cryptographic Key in eCharge Hardy Barth cPH2 / cPP2 charging stations
The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
AI Analysis
Technical Summary
CVE-2025-48417 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations running firmware versions up to 2.2.0. The core issue is that the TLS certificate and private key used to secure the web admin interface (accessible via TCP port 443) are hard-coded into the device firmware and included in update files. These files reside in the /etc/ssl directory (e.g., salia.local.crt, salia.local.key, salia.local.pem) and cannot be replaced or customized by administrators. This design flaw allows an attacker who obtains the private key to decrypt and intercept TLS-protected traffic, enabling man-in-the-middle attacks against administrators managing the charging stations. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The impact includes potential exposure of administrative credentials, manipulation of device settings, and unauthorized control over charging station operations. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and lack of required privileges or user interaction. No patches or firmware updates are currently available from the vendor, and no known exploits have been reported in the wild. This vulnerability highlights a critical security design oversight in embedded IoT devices where cryptographic keys must be unique and configurable to prevent widespread compromise.
Potential Impact
For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the confidentiality and integrity of administrative communications. Successful exploitation could allow attackers to intercept sensitive information such as login credentials and configuration data, potentially leading to unauthorized control or disruption of charging services. This could undermine trust in EV infrastructure, cause operational downtime, and expose organizations to regulatory penalties under GDPR if personal or operational data is compromised. Given the increasing reliance on electric vehicle infrastructure in Europe, particularly in countries aggressively promoting EV adoption, the vulnerability could have cascading effects on critical transportation and energy sectors. The lack of ability to configure custom TLS certificates means that mitigation is not straightforward and may require network segmentation or vendor firmware updates. While availability is not directly impacted, the indirect effects of compromised management interfaces could lead to service interruptions or malicious reconfiguration.
Mitigation Recommendations
1. Network Segmentation: Isolate charging station management interfaces within secure, access-controlled network segments to limit exposure to untrusted networks. 2. Access Controls: Implement strict firewall rules and VPN access to restrict administrative interface access only to authorized personnel and trusted IP addresses. 3. Monitoring and Logging: Enable detailed logging of administrative access and monitor for unusual activity indicative of MITM or unauthorized access attempts. 4. Vendor Coordination: Engage with eCharge Hardy Barth to request firmware updates that allow custom TLS certificate configuration or replacement of hard-coded keys. 5. Certificate Pinning: Where possible, implement certificate pinning on management clients to detect unauthorized certificate use. 6. Physical Security: Ensure physical security of charging stations to prevent local extraction of firmware or keys. 7. Incident Response Planning: Prepare response plans for potential compromise scenarios involving charging station management interfaces. 8. Regular Audits: Conduct periodic security audits and vulnerability assessments of EV infrastructure components to detect similar issues early.
Affected Countries
Germany, Netherlands, France, Belgium, Sweden, Norway, United Kingdom
CVE-2025-48417: CWE-321 Use of Hard-coded Cryptographic Key in eCharge Hardy Barth cPH2 / cPP2 charging stations
Description
The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
AI-Powered Analysis
Technical Analysis
CVE-2025-48417 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations running firmware versions up to 2.2.0. The core issue is that the TLS certificate and private key used to secure the web admin interface (accessible via TCP port 443) are hard-coded into the device firmware and included in update files. These files reside in the /etc/ssl directory (e.g., salia.local.crt, salia.local.key, salia.local.pem) and cannot be replaced or customized by administrators. This design flaw allows an attacker who obtains the private key to decrypt and intercept TLS-protected traffic, enabling man-in-the-middle attacks against administrators managing the charging stations. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The impact includes potential exposure of administrative credentials, manipulation of device settings, and unauthorized control over charging station operations. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and lack of required privileges or user interaction. No patches or firmware updates are currently available from the vendor, and no known exploits have been reported in the wild. This vulnerability highlights a critical security design oversight in embedded IoT devices where cryptographic keys must be unique and configurable to prevent widespread compromise.
Potential Impact
For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the confidentiality and integrity of administrative communications. Successful exploitation could allow attackers to intercept sensitive information such as login credentials and configuration data, potentially leading to unauthorized control or disruption of charging services. This could undermine trust in EV infrastructure, cause operational downtime, and expose organizations to regulatory penalties under GDPR if personal or operational data is compromised. Given the increasing reliance on electric vehicle infrastructure in Europe, particularly in countries aggressively promoting EV adoption, the vulnerability could have cascading effects on critical transportation and energy sectors. The lack of ability to configure custom TLS certificates means that mitigation is not straightforward and may require network segmentation or vendor firmware updates. While availability is not directly impacted, the indirect effects of compromised management interfaces could lead to service interruptions or malicious reconfiguration.
Mitigation Recommendations
1. Network Segmentation: Isolate charging station management interfaces within secure, access-controlled network segments to limit exposure to untrusted networks. 2. Access Controls: Implement strict firewall rules and VPN access to restrict administrative interface access only to authorized personnel and trusted IP addresses. 3. Monitoring and Logging: Enable detailed logging of administrative access and monitor for unusual activity indicative of MITM or unauthorized access attempts. 4. Vendor Coordination: Engage with eCharge Hardy Barth to request firmware updates that allow custom TLS certificate configuration or replacement of hard-coded keys. 5. Certificate Pinning: Where possible, implement certificate pinning on management clients to detect unauthorized certificate use. 6. Physical Security: Ensure physical security of charging stations to prevent local extraction of firmware or keys. 7. Incident Response Planning: Prepare response plans for potential compromise scenarios involving charging station management interfaces. 8. Regular Audits: Conduct periodic security audits and vulnerability assessments of EV infrastructure components to detect similar issues early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-05-20T07:34:22.865Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682dc923c4522896dcbfcdcb
Added to database: 5/21/2025, 12:37:55 PM
Last enriched: 11/4/2025, 1:30:27 AM
Last updated: 11/22/2025, 6:01:50 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.