CVE-2024-23969

8.8 HIGH

📋 TL;DR

This is a critical buffer overflow vulnerability in ChargePoint Home Flex charging stations that allows attackers on the same network to execute arbitrary code with root privileges without authentication. The flaw exists in the wlanchnllst function due to insufficient input validation, enabling remote code execution. All ChargePoint Home Flex charging stations with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • ChargePoint Home Flex charging stations
Versions: Specific vulnerable firmware versions not publicly detailed in CVE description
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations appear vulnerable. Requires network adjacency to the charging station.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete root control over charging stations, potentially enabling them to disrupt charging operations, steal user data, or use the device as a foothold into other network systems.

🟠

Likely Case

Attackers execute arbitrary code to disrupt charging operations, potentially causing denial of service or manipulating charging behavior.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated charging station network segment.

🌐 Internet-Facing: LOW (Charging stations are typically not directly internet-facing, though some configurations might expose them)
🏢 Internal Only: HIGH (Attackers on the same network can exploit this without authentication)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access but no authentication. Buffer overflow exploitation typically requires some technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check ChargePoint firmware updates

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1051/

Restart Required: Yes

Instructions:

1. Check ChargePoint support portal for firmware updates. 2. Download latest firmware. 3. Apply update through ChargePoint management interface. 4. Reboot charging station.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charging stations on separate VLAN with strict access controls

Access Control Lists

all

Implement network ACLs to restrict access to charging station management interfaces

🧯 If You Can't Patch

  • Physically isolate charging stations from other critical networks
  • Implement strict firewall rules allowing only necessary traffic to charging stations

🔍 How to Verify

Check if Vulnerable:

Check firmware version in ChargePoint management interface and compare against patched versions from vendor advisory

Check Version:

Check through ChargePoint mobile app or web interface for firmware version

Verify Fix Applied:

Confirm firmware version has been updated to patched version and test network connectivity restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to charging station management ports
  • Multiple failed connection attempts followed by successful exploit

Network Indicators:

  • Unusual traffic patterns to charging station on non-standard ports
  • Buffer overflow patterns in network traffic

SIEM Query:

source_ip IN (charging_station_ips) AND (port=80 OR port=443) AND payload_size > threshold

🔗 References

📤 Share & Export