Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-34587: VDE-2021-047 | CERT@VDE

In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.

CVE
#xss#vulnerability#web#perl#buffer_overflow#auth#ssh

2022-04-26 12:00 (CEST) VDE-2021-047

BENDER/EBEE: Multiple Charge Controller Vulnerabilities
Share: Email | Twitter

**

Published

**

2022-04-26 12:00 (CEST)

**

Last update

**

2022-04-27 16:46 (CEST)

Vendor(s)

Bender GmbH & Co. KG

Product(s)

Article No°

Product Name

Affected Version(s)

CC612

< 5.11.2

CC612

< 5.12.5

CC612

< 5.13.2

CC612

< 5.20.2

CC613

< 5.11.2

CC613

< 5.12.5

CC613

< 5.13.2

CC613

< 5.20.2

ICC15xx

< 5.11.2

ICC15xx

< 5.12.5

ICC15xx

< 5.13.2

ICC15xx

< 5.20.2

ICC16xx

< 5.11.2

ICC16xx

< 5.12.5

ICC16xx

< 5.13.2

ICC16xx

< 5.20.2

**

Summary

**

Bender is publishing this advisory to inform customers about multiple security vulnerabilities in the Charge Controller product families.
Bender has analysed the weaknesses and determined that the electrical safety of the devices is not concerned. To Benders knowledge, proof-of-concept code or exploits for the weaknesses are not available to the public.
Bender considers some weaknesses to be critical and thus need to be patched immediately. Therefore, patches are provided as maintenance branch versions 5.11.2, 5.12.5, 5.13.2 and 5.20.2. Future software releases will of course already include these patches.

**

Vulnerabilities

**

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may …

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with …

Weakness

Direct Request (Forced Browsing) (CWE-425)

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is …

Weakness

Execution with Unnecessary Privileges (CWE-250)

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.

Weakness

Cross-site Scripting (XSS) (CWE-79)

Summary

In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.

Weakness

Stack-based Buffer Overflow (CWE-121)

Summary

In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.

**

Impact

**

The vulnerability allows a malicious entity to bypass credential check and escalate privileges.

**

Solution

**

Mitigation

  • restrict network access to the above-mentioned devices

Remediation

  • install latest software update

**

Reported by

**

Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work.
Bender would also like to thank Qianxin StarV Security Lab, China.
The issue was coordinated by CERT@VDE.

Related news

CVE-2021-34587: VDE-2021-047 | CERT@VDE

In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907