Vulnerability Details CVE-2025-24002
An unauthenticated remote attacker can use MQTT messages to crash a service on charging stations complying with German Calibration Law, resulting in a temporary denial-of-service for these stations until they got restarted by the watchdog.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 25.4%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2025-24002
-
cpe:2.3:h:phoenixcontact:charx_sec-3000:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3050:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3100:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3150:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.4