Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-11666 β€” AI Deep Analysis Summary

CVSS 9.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: ONEKEY Platform suffers from **Data Forgery** due to disabled mutual authentication. πŸ“‰ **Consequences**: Remote attackers can execute **arbitrary commands** with elevated privileges on affected devices.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-345** (Insufficient Verification of Data Authenticity). The core flaw is that **mutual authentication is disabled everywhere**, allowing untrusted data injection.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **ONEKEY Platform** (specifically the **cph2_echarge_firmware** by vendor **hardy-barth**). These are **EV charging station controllers**.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Remote, **unauthenticated** users can gain **elevated privileges**.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **Low**. Access Vector is **Network (AV:N)**. No Authentication (PR:N) or User Interaction (UI:N) required.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exploit**: **No**. The `pocs` list is empty. No public Proof-of-Concept or wild exploitation code is currently available in the provided data.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for **ONEKEY Platform** components in EV charging infrastructure. Verify if **mutual authentication** is enabled on the `cph2_echarge_firmware`. Look for unauthorized command execution logs.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **Yes**. The vendor (hardy-barth/ONEKEY) published an advisory on **2024-11-24**. Users should check the official ONEKEY resource page for patches.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Since auth is disabled globally, **network segmentation** is critical. Isolate EV charging controllers from public networks. Restrict access to management interfaces strictly.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. CVSS Score is **Critical** (implied by H/H/H impacts). Although AC is High, the lack of auth requirement and potential for remote code execution makes immediate patching essential.