CVE-2023-0863

8.8 HIGH

📋 TL;DR

This CVE describes an improper authentication vulnerability in multiple ABB Terra AC wallbox electric vehicle charging station models. Attackers can bypass authentication mechanisms to gain unauthorized access to device functions. All listed ABB Terra AC wallbox products running affected firmware versions are vulnerable.

💻 Affected Systems

Products:
  • ABB Terra AC wallbox (UL40/80A)
  • ABB Terra AC wallbox (UL32A)
  • ABB Terra AC wallbox (CE) (Terra AC MID)
  • ABB Terra AC wallbox (CE) Terra AC Juno CE
  • ABB Terra AC wallbox (CE) Terra AC PTB
  • ABB Terra AC wallbox (CE) Symbiosis
  • ABB Terra AC wallbox (JP)
Versions: Terra AC wallbox (UL40/80A): 1.0;0 through 1.5.5; Terra AC wallbox (UL32A): 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB: 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: 1.0;0 through 1.2.7; Terra AC wallbox (JP): 1.0;0 through 1.6.5
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable regardless of configuration. The vulnerability exists in the authentication mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging station allowing attackers to disable charging, manipulate charging rates, access user data, or potentially cause physical damage through electrical manipulation.

🟠

Likely Case

Unauthorized access to charging station management functions, enabling attackers to disrupt charging services, access user information, or manipulate billing data.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and authentication controls, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - These are IoT devices often deployed with internet connectivity for remote management, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Even internally, attackers could exploit this to disrupt charging infrastructure or gain unauthorized access to network segments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-287 indicates improper authentication, suggesting attackers can bypass authentication without credentials. Given the CVSS score of 8.8 and typical IoT device security, exploitation is likely straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above the affected ranges: UL40/80A > 1.5.5; UL32A > 1.6.5; CE MID > 1.6.5; Juno CE > 1.6.5; PTB > 1.5.25; Symbiosis > 1.2.7; JP > 1.6.5

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108468A1415&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware update from ABB portal. 2. Connect to wallbox management interface. 3. Upload firmware file. 4. Apply update. 5. Device will restart automatically. 6. Verify new firmware version.

🔧 Temporary Workarounds

Network segmentation

all

Isolate charging stations on separate VLAN with strict firewall rules limiting access to management interfaces

Access control lists

all

Implement IP-based access restrictions to only allow management from authorized administrative networks

🧯 If You Can't Patch

  • Disconnect devices from internet and place behind strict network segmentation
  • Implement physical security controls to prevent unauthorized physical access to devices

🔍 How to Verify

Check if Vulnerable:

Check firmware version via wallbox web interface or management console. Compare against affected version ranges.

Check Version:

Access wallbox web interface at device IP, navigate to System Information or Settings to view firmware version

Verify Fix Applied:

Confirm firmware version is above affected ranges after update. Test authentication mechanisms to ensure proper access controls.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Authentication bypass patterns
  • Unauthorized configuration changes

Network Indicators:

  • Unusual management interface access from unexpected IPs
  • Authentication protocol anomalies

SIEM Query:

source="wallbox" AND (event_type="auth_failure" OR event_type="config_change") | stats count by src_ip, user

🔗 References

📤 Share & Export