- Description
- Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel since peer verification is disabled everywhere. Therefore, remote unauthenticated users suitably positioned on the network between an EV charger controller and eCharge infrastructure can execute arbitrary commands with elevated privileges on affected devices. This issue affects cph2_echarge_firmware: through 2.0.4.
- Source
- research@onekey.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- Hype score
- Not currently trending
[CVE-2024-11666: CRITICAL] Devices using cph2_echarge_firmware: up to version 2.0.4 are vulnerable to remote attacks due to disabled peer verification. Attackers can execute commands with elevated privileges.#cybersecurity,#vulnerability https://t.co/9EPpZ5DadP https://t.co/brvJV
@CveFindCom
24 Nov 2024
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-11666 Affected devices beacon to eCharge cloud infrastructure asking if there are any command they should run. This communication is established over an insecure channel si… https://t.co/HLnFoCxYLB
@CVEnew
24 Nov 2024
712 Impressions
3 Retweets
2 Likes
2 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:echarge:salia_plcc_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "68BE2BFC-8664-4D95-AB52-0724D268B9AA",
"versionEndIncluding": "2.0.4"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:echarge:salia_plcc:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "7ABECA31-3F68-4CAC-991F-7EC594A2A779"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]