CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295.
Analysis
Critical authentication bypass vulnerability in WOLFBOX Level 2 EV Charger devices caused by uninitialized cryptographic key variables in BLE vendor-specific encrypted communications. Network-adjacent attackers can completely bypass authentication without credentials, gaining full system access (confidentiality, integrity, and availability compromise). The vulnerability (CVSS 8.8) affects encrypted BLE communications and represents a significant risk to EV charging infrastructure security, though real-world exploitation likelihood depends on proximity requirements and patch availability from WOLFBOX.
Technical Context
The vulnerability exists in the Bluetooth Low Energy (BLE) implementation of WOLFBOX Level 2 EV Charger devices, specifically in vendor-specific encrypted communication protocols. The root cause is CWE-457 (Use of Uninitialized Variable), where cryptographic key variables used for BLE encryption are not properly initialized before use. This allows attackers to interact with the authentication mechanism using uninitialized (predictable or null) key values, effectively bypassing the intended encryption-based access control. The issue affects the vendor's proprietary BLE security implementation rather than standard BLE security protocols. The uninitialized variable likely contains a default or predictable state that can be exploited during the key exchange or authentication handshake phases of BLE communication.
Affected Products
WOLFBOX Level 2 EV Charger (specific version range not provided in available data; typically models include WOLFBOX WB245 and similar Level 2 charger variants). Affected component: BLE wireless interface and vendor-specific encrypted communication module. CPE data not explicitly provided; however, affected product likely maps to CPE patterns for IoT EV charging equipment. Vendor: WOLFBOX. The vulnerability was previously tracked as ZDI-CAN-26295 by Trend Micro's Zero Day Initiative before public CVE assignment. Exact affected firmware versions should be obtained from WOLFBOX security advisories.
Remediation
Specific remediation steps: (1) Contact WOLFBOX support for a firmware patch addressing the uninitialized variable in BLE cryptographic key handling; (2) Apply the latest firmware update to all affected WOLFBOX Level 2 charger units when available; (3) Temporary mitigations pending patch: disable BLE functionality if not required for operation, or restrict physical proximity to chargers (secure outdoor installation, barrier placement); (4) Monitor for unexpected BLE connections to chargers and implement network segmentation; (5) Review charger logs for unauthorized authentication attempts. Patch availability and specific firmware versions should be obtained from WOLFBOX's official security advisory (referenced as ZDI-CAN-26295 disclosure). Users should subscribe to WOLFBOX security updates and monitor advisories from the Zero Day Initiative for coordinated disclosure timelines.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17313