First published: Fri Jun 21 2024(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Autel MaxiCharger AC Elite Business C50 charging stations. Authentication is not required to exploit this vulnerability. The specific flaw exists within the BLE AppAuthenRequest command handler. The handler uses hardcoded credentials as a fallback in case of an authentication request failure. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Autel MaxiCharger |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-852 is considered high due to the ability of attackers to bypass authentication without requiring any user interaction.
To fix ZDI-24-852, it is recommended to update the affected Autel MaxiCharger AC Elite Business C50 charging stations to the latest firmware version provided by the vendor.
ZDI-24-852 affects installations of Autel MaxiCharger AC Elite Business C50 charging stations that have not implemented necessary security patches.
The impact of ZDI-24-852 allows unauthorized network-adjacent attackers to bypass authentication, potentially leading to unauthorized access and control of the charging stations.
No, authentication is not required to exploit ZDI-24-852, making it a critical vulnerability.