CVE-2023-29114

5.7 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to access system logs through the web management interface, exposing sensitive credentials and configuration details. It affects Enel X Waybox 3 EV chargers with vulnerable firmware versions. Attackers can steal Wi-Fi, APN, IPSEC, and web interface credentials stored in plaintext logs.

💻 Affected Systems

Products:
  • Enel X Waybox 3 EV Charger
Versions: Firmware versions prior to the June 2024 security update
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the web management interface enabled. The vulnerability exists in the log access functionality of the web application.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the EV charger, allowing attackers to steal all stored credentials, reconfigure the device, disrupt charging operations, and potentially pivot to connected networks.

🟠

Likely Case

Credential theft leading to unauthorized access to the web interface, Wi-Fi networks, and backend systems, potentially enabling further attacks on the charging infrastructure.

🟢

If Mitigated

Limited information disclosure if proper network segmentation and access controls prevent external access to the web management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the web management interface. No authentication is needed to access the vulnerable log endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version with June 2024 security update

Vendor Advisory: https://support-emobility.enelx.com/content/dam/enelxmobility/italia/documenti/manuali-schede-tecniche/Waybox-3-Security-Bulletin-06-2024-V1.pdf

Restart Required: Yes

Instructions:

1. Download the latest firmware from Enel X support portal. 2. Log into the web management interface. 3. Navigate to System > Firmware Update. 4. Upload and apply the firmware update. 5. Reboot the device after installation completes.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Temporarily disable the web management interface to prevent external access while awaiting patch.

Connect via SSH/Telnet if available and disable web service
Check device documentation for specific disable commands

Network Segmentation

all

Isolate EV chargers on a separate VLAN with strict firewall rules blocking external access to management interfaces.

Configure firewall to block port 80/443 to charger management IPs from untrusted networks

🧯 If You Can't Patch

  • Implement strict network access controls to limit web interface access to authorized IP addresses only
  • Regularly monitor and rotate all credentials stored in the system logs

🔍 How to Verify

Check if Vulnerable:

Attempt to access /logs or similar log endpoints via the web interface without authentication. If logs containing credentials are accessible, the system is vulnerable.

Check Version:

Check firmware version in web interface under System > About or via SSH if available

Verify Fix Applied:

After patching, attempt the same log access. Access should be denied or logs should no longer contain sensitive credentials in plaintext.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to log endpoints
  • Multiple failed authentication attempts followed by log access

Network Indicators:

  • Unusual HTTP GET requests to /logs or similar paths from external IPs
  • Traffic patterns indicating credential extraction

SIEM Query:

source="web_server" AND (url_path="/logs" OR url_path CONTAINS "log") AND http_method="GET" AND user_agent NOT IN allowed_user_agents

🔗 References

📤 Share & Export