Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48417: CWE-321 Use of Hard-coded Cryptographic Key in eCharge Hardy Barth cPH2 / cPP2 charging stations

0
Medium
VulnerabilityCVE-2025-48417cvecve-2025-48417cwe-321
Published: Wed May 21 2025 (05/21/2025, 12:30:08 UTC)
Source: CVE
Vendor/Project: eCharge Hardy Barth
Product: cPH2 / cPP2 charging stations

Description

The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:30:27 UTC

Technical Analysis

CVE-2025-48417 is a vulnerability classified under CWE-321 (Use of Hard-coded Cryptographic Key) affecting eCharge Hardy Barth cPH2 and cPP2 electric vehicle charging stations running firmware versions up to 2.2.0. The core issue is that the TLS certificate and private key used to secure the web admin interface (accessible via TCP port 443) are hard-coded into the device firmware and included in update files. These files reside in the /etc/ssl directory (e.g., salia.local.crt, salia.local.key, salia.local.pem) and cannot be replaced or customized by administrators. This design flaw allows an attacker who obtains the private key to decrypt and intercept TLS-protected traffic, enabling man-in-the-middle attacks against administrators managing the charging stations. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The impact includes potential exposure of administrative credentials, manipulation of device settings, and unauthorized control over charging station operations. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and lack of required privileges or user interaction. No patches or firmware updates are currently available from the vendor, and no known exploits have been reported in the wild. This vulnerability highlights a critical security design oversight in embedded IoT devices where cryptographic keys must be unique and configurable to prevent widespread compromise.

Potential Impact

For European organizations deploying eCharge Hardy Barth cPH2 and cPP2 charging stations, this vulnerability poses a significant risk to the confidentiality and integrity of administrative communications. Successful exploitation could allow attackers to intercept sensitive information such as login credentials and configuration data, potentially leading to unauthorized control or disruption of charging services. This could undermine trust in EV infrastructure, cause operational downtime, and expose organizations to regulatory penalties under GDPR if personal or operational data is compromised. Given the increasing reliance on electric vehicle infrastructure in Europe, particularly in countries aggressively promoting EV adoption, the vulnerability could have cascading effects on critical transportation and energy sectors. The lack of ability to configure custom TLS certificates means that mitigation is not straightforward and may require network segmentation or vendor firmware updates. While availability is not directly impacted, the indirect effects of compromised management interfaces could lead to service interruptions or malicious reconfiguration.

Mitigation Recommendations

1. Network Segmentation: Isolate charging station management interfaces within secure, access-controlled network segments to limit exposure to untrusted networks. 2. Access Controls: Implement strict firewall rules and VPN access to restrict administrative interface access only to authorized personnel and trusted IP addresses. 3. Monitoring and Logging: Enable detailed logging of administrative access and monitor for unusual activity indicative of MITM or unauthorized access attempts. 4. Vendor Coordination: Engage with eCharge Hardy Barth to request firmware updates that allow custom TLS certificate configuration or replacement of hard-coded keys. 5. Certificate Pinning: Where possible, implement certificate pinning on management clients to detect unauthorized certificate use. 6. Physical Security: Ensure physical security of charging stations to prevent local extraction of firmware or keys. 7. Incident Response Planning: Prepare response plans for potential compromise scenarios involving charging station management interfaces. 8. Regular Audits: Conduct periodic security audits and vulnerability assessments of EV infrastructure components to detect similar issues early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-05-20T07:34:22.865Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682dc923c4522896dcbfcdcb

Added to database: 5/21/2025, 12:37:55 PM

Last enriched: 11/4/2025, 1:30:27 AM

Last updated: 11/22/2025, 6:01:50 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats