First published: Thu Aug 01 2024(Updated: )
This vulnerability allows network-adjacent attackers to compromise transport security on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CURLOPT_SSL_VERIFYHOST setting. The issue results from the lack of proper validation of the certificate presented by the server. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
ChargePoint Home Flex Firmware | ||
ChargePoint Home Flex Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-1052 is considered high due to its potential to compromise transport security without requiring authentication.
To fix ZDI-24-1052, update the ChargePoint Home Flex firmware to the latest version provided by the vendor.
ZDI-24-1052 affects installations of ChargePoint Home Flex charging stations.
ZDI-24-1052 can be exploited by network-adjacent attackers seeking to compromise transport security.
No, authentication is not required to exploit ZDI-24-1052.