Skip to content

Latest commit

 

History

History
15 lines (11 loc) · 859 Bytes

README.md

File metadata and controls

15 lines (11 loc) · 859 Bytes

Pwn2Own Automotive 2024 CHARX Exploit

This exploit was submitted successfully against the Phoenix Contact CHARX SEC-3100 during Pwn2Own Automotive 2024.

An accompanying blog post covers some of our research process and details on the vulnerabilities found, with a follow-up post on the actual exploitation techniques used.

Running the exploit requires:

  • CHARX running firmware 1.5.0
  • python3 / scapy
  • scapy will require root privileges to send raw packets
  • attacker machine plugged directly into the CHARX ETH1 ethernet port
  • attacker machine configured with IP 192.168.4.2

Once the exploit succeeds, there will be an interactive connect-back shell running as the charx-ca user (for the ControllerAgent service).