Advisory Details

August 1st, 2024

(0Day) (Pwn2Own) ChargePoint Home Flex SrvrToSmSetAutoChnlListMsg Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-24-1050
ZDI-CAN-23222

CVE ID CVE-2024-23968
CVSS SCORE 8.8, AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS ChargePoint
AFFECTED PRODUCTS Home Flex
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the SrvrToSmSetAutoChnlListMsg function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

01/28/24 – ZDI reported the vulnerability to the vendor.
02/05/24 – ZDI asked for confirmation of receipt.
02/06/24 – The vendor confirmed receipt of the report.
04/29/24 – ZDI asked for an update.
05/24/24 – ZDI asked for an update.
05/29/24 – The vendor states that the vulnerability has been addressed but would need to get verification from QA.
07/22/24 – ZDI asked for an update.
07/29/24 – The ZDI informed the vendor that since we never received a confirmation that the vulnerability was patched, we have no choice but to assume this issue hasn’t been remediated and that we intend to publish the report as a zero-day advisory on 8/01/24.

--Vendor Response 08/16/24: The vendor states this vulnerability was patched in April 2024.


DISCLOSURE TIMELINE
  • 2024-02-02 - Vulnerability reported to vendor
  • 2024-08-01 - Coordinated public release of advisory
  • 2024-08-21 - Advisory Updated
CREDIT Tobias Scharnowski (@ScepticCTF), Felix Buchmann
BACK TO ADVISORIES