CVE-2025-10371
Salia · Salia Multiple Products
A high-severity vulnerability has been identified in multiple Salia products, specifically affecting the eCharge Hardy Barth Salia PLCC 2 controller.
Executive summary
A high-severity vulnerability has been identified in multiple Salia products, specifically affecting the eCharge Hardy Barth Salia PLCC 2 controller. This flaw could potentially allow a remote attacker to disrupt or manipulate electric vehicle charging operations. Organizations utilizing the affected equipment should prioritize the application of vendor-supplied security updates to prevent operational downtime and potential unauthorized use of services.
Vulnerability
The security flaw exists within the Power Line Communication Controller (PLCC) of the affected eCharge systems. An unauthenticated remote attacker could send specially crafted network packets to the device's management interface. Successful exploitation could lead to a denial-of-service condition, rendering the charging station inoperable, or potentially allow unauthorized control over charging sessions, including starting or stopping them without proper authorization.
Business impact
This vulnerability is classified as High severity with a CVSS score of 7.3. Exploitation could lead to significant business disruption, including service unavailability for customers, leading to revenue loss and reputational damage. Furthermore, if an attacker gains control over charging sessions, it could result in direct financial losses through electricity theft or fraudulent billing. The operational integrity of the charging infrastructure is at risk, potentially impacting service level agreements and customer trust.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by Salia to all affected devices immediately. After patching, system administrators should review access and operational logs for any signs of compromise or unusual activity that occurred prior to the update.
Proactive Monitoring: Implement enhanced monitoring of network traffic to and from the affected charging stations. Specifically, look for unusual connection attempts, malformed packets targeting the PLCC's known ports, or unexpected device reboots. Monitor charging session logs for anomalies, such as sessions initiated outside of normal business hours or without corresponding payment data.
Compensating Controls: If immediate patching is not feasible, implement network segmentation to isolate the charging station controllers from public-facing networks. Use firewalls to restrict access to the devices' management interfaces, allowing connections only from trusted administrative IP addresses.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score and the direct impact on critical operational technology, we strongly recommend that organizations prioritize the immediate deployment of the vendor-provided patches for CVE-2025-10371. While this vulnerability is not currently on the CISA KEV list, its potential for causing significant operational and financial disruption makes it a critical risk. Organizations should treat this as a high-priority action item to safeguard their charging infrastructure and maintain service continuity.