Skip to content

ret2/Pwn2Own-Auto-2024-CHARX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Pwn2Own Automotive 2024 CHARX Exploit

This exploit was submitted successfully against the Phoenix Contact CHARX SEC-3100 during Pwn2Own Automotive 2024.

An accompanying blog post covers some of our research process and details on the vulnerabilities found, with a follow-up post on the actual exploitation techniques used.

Running the exploit requires:

  • CHARX running firmware 1.5.0
  • python3 / scapy
  • scapy will require root privileges to send raw packets
  • attacker machine plugged directly into the CHARX ETH1 ethernet port
  • attacker machine configured with IP 192.168.4.2

Once the exploit succeeds, there will be an interactive connect-back shell running as the charx-ca user (for the ControllerAgent service).

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages