The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
References
History

Wed, 21 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 May 2025 12:45:00 +0000

Type Values Removed Values Added
Description The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
Title Hard-Coded Certificate and Private Key for HTTPS Web Interface in eCharge Hardy Barth cPH2 / cPP2 charging stations
Weaknesses CWE-321
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published: 2025-05-21T12:30:08.012Z

Updated: 2025-05-21T13:51:37.636Z

Reserved: 2025-05-20T07:34:22.865Z

Link: CVE-2025-48417

cve-icon Vulnrichment

Updated: 2025-05-21T13:49:08.483Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-21T13:16:03.080

Modified: 2025-05-21T20:24:58.133

Link: CVE-2025-48417

cve-icon Redhat

No data.