CVE-2023-46360
📋 TL;DR
CVE-2023-46360 is a privilege escalation vulnerability in Hardy Barth cPH2 eCharge charging stations that allows attackers to execute commands with unnecessary elevated privileges. This affects cPH2 eCharge Ladestation version 1.87.0 and earlier. Organizations using these charging stations for electric vehicle infrastructure are at risk.
💻 Affected Systems
- Hardy Barth cPH2 eCharge Ladestation
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of charging station allowing attackers to manipulate charging operations, steal user data, or use the device as a foothold into connected networks.
Likely Case
Unauthorized access to charging station controls allowing manipulation of charging sessions, billing fraud, or service disruption.
If Mitigated
Limited impact if network segmentation and proper access controls prevent lateral movement from compromised charging stations.
🎯 Exploit Status
Exploitation requires some level of access to the device management interface. The vulnerability is related to CVE-2023-46359 (OS command injection).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v1.88.0 or later
Vendor Advisory: http://hardy.com
Restart Required: Yes
Instructions:
1. Contact Hardy Barth for updated firmware. 2. Backup current configuration. 3. Upload new firmware via management interface. 4. Reboot charging station. 5. Verify firmware version.
🔧 Temporary Workarounds
Network Segmentation
allIsolate charging stations on separate VLANs with strict firewall rules limiting inbound/outbound connections.
Access Control Restrictions
allImplement strict authentication and authorization controls for management interfaces.
🧯 If You Can't Patch
- Implement network-level controls to restrict access to charging station management interfaces
- Monitor for unusual network traffic patterns or unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check firmware version via management interface. If version is 1.87.0 or earlier, the system is vulnerable.
Check Version:
Check via web interface at http://[station-ip]/status or via SSH if enabled
Verify Fix Applied:
Verify firmware version is 1.88.0 or later after applying patch.
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation attempts
- Unauthorized access to management interfaces
- Unexpected system command execution
Network Indicators:
- Unusual outbound connections from charging stations
- Traffic to unexpected ports
- Multiple failed authentication attempts
SIEM Query:
source="charging-station" AND (event_type="privilege_escalation" OR cmd_exec="*" OR auth_failure>5)