The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://r.sec-consult.com/echarge |
|
History
Wed, 21 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 21 May 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates. | |
| Title | Hard-Coded Certificate and Private Key for HTTPS Web Interface in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
| Weaknesses | CWE-321 | |
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T12:30:08.012Z
Updated: 2025-05-21T13:51:37.636Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48417
Updated: 2025-05-21T13:49:08.483Z
Status : Awaiting Analysis
Published: 2025-05-21T13:16:03.080
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-48417
No data.