Impact
A missing authentication check in the telnet service on Enel X JuiceBox 40 charging stations permits an attacker to run arbitrary code with the privileges of the service account. The telnet service listens on TCP port 2000 by default and does not require any credentials; thus, authentication is not enforced before allowing remote connections. Based on the description, it is inferred that an attacker who can reach the network can connect to this port and execute code, resulting in full compromise of the device’s confidentiality, integrity, and availability.
Affected Systems
The affected product is the Enel X JuiceBox 40 charging station. No specific firmware revisions or version ranges are provided, so all units that ship with the default telnet service enabled should be considered vulnerable.
Risk and Exploitability
The CVSS score is 8.8, indicating a severe risk. The EPSS score is reported as less than 1%, which suggests that current exploitation rates are very low, yet the weakness remains present. This vulnerability is not listed in CISA’s KEV catalog. It is inferred that the likely attack vector is any network element that can access the telnet port—such as nearby sensors or management devices on the same local network—because authentication is not required, making the exploit straightforward for an attacker with network access.
OpenCVE Enrichment