CVE-2024-23970
📋 TL;DR
This vulnerability in ChargePoint Home Flex charging stations allows network-adjacent attackers to bypass SSL certificate validation, potentially enabling man-in-the-middle attacks. Attackers could intercept or manipulate communication between the charging station and its servers without authentication. This affects ChargePoint Home Flex charging stations with vulnerable configurations.
💻 Affected Systems
- ChargePoint Home Flex charging stations
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers combine this with other vulnerabilities to achieve remote code execution as root, potentially taking full control of the charging station, manipulating charging operations, or accessing connected networks.
Likely Case
Attackers perform man-in-the-middle attacks to intercept sensitive data (user credentials, charging session data) or manipulate communication between the charging station and ChargePoint servers.
If Mitigated
With proper network segmentation and monitoring, impact is limited to potential data interception within the isolated charging network segment.
🎯 Exploit Status
Requires network access and additional vulnerabilities for code execution; SSL bypass alone enables MITM attacks
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in public advisory
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-24-1052/
Restart Required: Yes
Instructions:
1. Check ChargePoint support for firmware updates 2. Apply latest firmware update 3. Restart charging station 4. Verify SSL certificate validation is enabled
🔧 Temporary Workarounds
Network segmentation
allIsolate charging stations on dedicated VLAN with strict access controls
Network monitoring
allMonitor for SSL/TLS anomalies and unexpected outbound connections
🧯 If You Can't Patch
- Segment charging stations on isolated network with no other devices
- Implement strict firewall rules to limit charging station communication to only necessary ChargePoint servers
🔍 How to Verify
Check if Vulnerable:
Check firmware version against ChargePoint's patched versions; test SSL certificate validation by attempting MITM with invalid certificates
Check Version:
Check through ChargePoint mobile app or web interface for firmware version
Verify Fix Applied:
Verify firmware is updated to latest version; test that invalid SSL certificates are rejected
📡 Detection & Monitoring
Log Indicators:
- SSL/TLS handshake failures
- Unexpected certificate changes
- Failed authentication attempts
Network Indicators:
- Unusual outbound connections
- SSL/TLS protocol anomalies
- MITM attack patterns
SIEM Query:
source="charging_station" AND (event_type="ssl_error" OR event_type="certificate_validation_failure")