CVE-2024-23968

8.8 HIGH

📋 TL;DR

This buffer overflow vulnerability in ChargePoint Home Flex charging stations allows network-adjacent attackers to execute arbitrary code as root without authentication. The flaw exists in the SrvrToSmSetAutoChnlListMsg function where user-supplied data length isn't validated before copying to a fixed buffer. All ChargePoint Home Flex charging stations with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • ChargePoint Home Flex charging stations
Versions: Specific vulnerable firmware versions not publicly detailed in CVE description
Operating Systems: Embedded/Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations appear vulnerable. Network adjacency required (same broadcast domain).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging station with root-level code execution, allowing attackers to disable charging, manipulate billing, access connected networks, or use the device as a foothold for lateral movement.

🟠

Likely Case

Remote code execution leading to charging disruption, data theft from the device, or use as a network pivot point.

🟢

If Mitigated

Limited impact if devices are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

No authentication required, but network adjacency needed. Buffer overflow exploitation requires crafting specific network packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in CVE description - check vendor advisory

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1050/

Restart Required: No

Instructions:

1. Check ChargePoint vendor advisory for patched firmware version. 2. Update charging station firmware through ChargePoint management interface. 3. Verify update completion and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charging stations on separate VLAN with strict firewall rules limiting communication to management systems only.

Access Control Lists

all

Implement network ACLs to restrict which devices can communicate with charging stations.

🧯 If You Can't Patch

  • Segment charging stations on isolated network with no internet access
  • Implement strict firewall rules blocking all unnecessary traffic to charging stations

🔍 How to Verify

Check if Vulnerable:

Check firmware version against vendor's vulnerable version list. Monitor for unexpected network traffic to charging stations.

Check Version:

Check through ChargePoint management interface or mobile app for firmware version information.

Verify Fix Applied:

Confirm firmware version matches patched version from vendor advisory. Test charging functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected reboots
  • Failed firmware update attempts
  • Unusual network connections

Network Indicators:

  • Unusual traffic patterns to charging stations
  • Malformed packets targeting port used by SrvrToSmSetAutoChnlListMsg function

SIEM Query:

source_ip IN (charging_station_ips) AND (packet_size > normal_threshold OR protocol_anomaly = true)

🔗 References

📤 Share & Export