The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Wed, 21 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Wed, 21 May 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The certificate and private key used for providing transport layer security for connections to the web interface (TCP port 443) is hard-coded in the firmware and are shipped with the update files. An attacker can use the private key to perform man-in-the-middle attacks against users of the admin interface. The files are located in /etc/ssl (e.g. salia.local.crt, salia.local.key and salia.local.pem). There is no option to upload/configure custom TLS certificates. | |
| Title | Hard-Coded Certificate and Private Key for HTTPS Web Interface in eCharge Hardy Barth cPH2 / cPP2 charging stations | |
| Weaknesses | CWE-321 | |
| References | 
         | 
Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-05-21T12:30:08.012Z
Updated: 2025-11-03T20:04:52.170Z
Reserved: 2025-05-20T07:34:22.865Z
Link: CVE-2025-48417
Updated: 2025-11-03T20:04:52.170Z
Status : Awaiting Analysis
Published: 2025-05-21T13:16:03.080
Modified: 2025-11-03T20:19:06.917
Link: CVE-2025-48417
No data.