CVE-2023-29117

8.8 HIGH

📋 TL;DR

CVE-2023-29117 is an authentication bypass vulnerability in Waybox Enel X web management API that allows attackers to gain administrator privileges without valid credentials. This affects Waybox systems with exposed management interfaces, potentially compromising electric vehicle charging infrastructure management.

💻 Affected Systems

Products:
  • Waybox Enel X
Versions: Specific versions not detailed in reference; all versions prior to security bulletin patch
Operating Systems: Embedded/Linux-based systems running Waybox firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with web management API enabled (typically default). Requires network access to management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Waybox system allowing attackers to manipulate charging operations, access sensitive customer data, disrupt charging services, and potentially pivot to other network systems.

🟠

Likely Case

Unauthorized administrative access leading to configuration changes, data theft, and service disruption for affected charging stations.

🟢

If Mitigated

Limited impact if systems are properly segmented, API access is restricted, and monitoring detects authentication anomalies.

🌐 Internet-Facing: HIGH - Web management API is typically exposed for remote administration, making internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access, reducing exposure surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are typically easy to exploit once the method is understood. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in Waybox-3-Security-Bulletin-06-2024

Vendor Advisory: https://support-emobility.enelx.com/content/dam/enelxmobility/italia/documenti/manuali-schede-tecniche/Waybox-3-Security-Bulletin-06-2024-V1.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Enel X support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or local method. 4. Verify authentication mechanisms are functioning correctly.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to Waybox management interface to trusted networks only

iptables -A INPUT -p tcp --dport [management_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [management_port] -j DROP

API Access Restriction

all

Implement network-level restrictions on web management API endpoints

🧯 If You Can't Patch

  • Isolate Waybox systems on dedicated VLAN with strict firewall rules allowing only necessary traffic
  • Implement network monitoring for authentication bypass attempts and unauthorized API access

🔍 How to Verify

Check if Vulnerable:

Test authentication bypass by attempting API calls without valid credentials to management endpoints. Monitor for successful unauthorized access.

Check Version:

Check firmware version via web interface or consult device documentation for CLI version check

Verify Fix Applied:

Verify authentication properly rejects unauthorized API requests. Test that valid credentials are required for all administrative functions.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful administrative actions
  • API requests from unusual IP addresses with administrative privileges
  • Authentication logs showing bypass patterns

Network Indicators:

  • Unusual API traffic patterns to management endpoints
  • Administrative requests without preceding authentication handshake
  • Traffic to management interface from unauthorized networks

SIEM Query:

source="waybox" AND (event_type="api_call" AND auth_result="success" AND NOT auth_method="password") OR (src_ip NOT IN allowed_networks AND dest_port=management_port)

🔗 References

📤 Share & Export