CVE-2024-23959

8.0 HIGH

📋 TL;DR

This vulnerability allows attackers on the same network to execute arbitrary code on Autel MaxiCharger AC Elite Business C50 charging stations by exploiting a stack-based buffer overflow in the BLE AppChargingControl command. Although authentication is required, the authentication mechanism can be bypassed. This affects organizations using these specific charging stations.

💻 Affected Systems

Products:
  • Autel MaxiCharger AC Elite Business C50
Versions: Specific vulnerable versions not specified in advisory, but all versions prior to patch are likely affected
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network adjacency and BLE access to the charging station

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging station allowing attackers to disrupt charging operations, manipulate billing data, or use the device as a foothold into connected networks.

🟠

Likely Case

Attackers gaining control of charging stations to disrupt operations, potentially causing service outages or manipulating charging parameters.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though the vulnerability remains present.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Authentication bypass required but possible according to advisory; requires BLE access and knowledge of the protocol

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-851/

Restart Required: Yes

Instructions:

1. Contact Autel support for firmware update
2. Download latest firmware from Autel portal
3. Apply firmware update following manufacturer instructions
4. Restart charging station

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charging stations on separate VLANs with strict firewall rules

BLE Access Control

all

Restrict BLE access to authorized devices only using MAC filtering or similar controls

🧯 If You Can't Patch

  • Segment charging station network from critical infrastructure
  • Implement strict network monitoring for unusual BLE traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version against vendor advisory; test with ZDI-24-851 proof-of-concept if available

Check Version:

Check via Autel management interface or device display (specific command not documented)

Verify Fix Applied:

Verify firmware version matches patched version from vendor; test that BLE AppChargingControl command no longer causes buffer overflow

📡 Detection & Monitoring

Log Indicators:

  • Unusual BLE connection attempts
  • Multiple failed authentication attempts followed by AppChargingControl commands
  • Device restart events

Network Indicators:

  • Unusual BLE traffic patterns to charging stations
  • Multiple connection attempts from single source

SIEM Query:

source="charging_station" AND (event="authentication_failure" OR command="AppChargingControl")

🔗 References

📤 Share & Export