Vulnerability Details CVE-2025-24003
An unauthenticated remote attacker can use MQTT messages to trigger out-of-bounds writes in charging stations complying with German Calibration Law, resulting in a loss of integrity for only EichrechtAgents and potential denial-of-service for these stations.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 29.7%
CVSS Severity
CVSS v3 Score 8.2
Products affected by CVE-2025-24003
-
cpe:2.3:h:phoenixcontact:charx_sec-3000:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3050:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3100:-
-
cpe:2.3:h:phoenixcontact:charx_sec-3150:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3000_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3050_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3100_firmware:1.6.4
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:-
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.2.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.3.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.4.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.0
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.1
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.5.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.2
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.3
-
cpe:2.3:o:phoenixcontact:charx_sec-3150_firmware:1.6.4