May 17, 2023
Jul 10, 2023
500 words
3m
ABB, with the assistance of myself, puck, and an unrelated party, are today releasing an urgent security advisory and adjacent firmware update for all ABB Terra AC Wallbox Electric Vehicle Supply Equipment (EVSE). The vulnerability this refers to is known to affect all ABB Terra AC Wallboxes in circulation up to and including version v1.6.5. Affected Wallboxes have serial numbers starting TACW, and model numbers starting either W4-, W7-, W11-, or W22-.
An attacker armed with knowledge of this vulnerability is able to connect with administrator privileges (also known as TerraConfig) to any Wallbox in Bluetooth range, with no physical access required whatsoever. They can then gain full control over the EVSE, including changing its connected OCPP server, instantiating a free vend, or modifying electrical safety parameters, among other things.
This vulnerability cannot be mitigated, except by updating to a newer firmware version. If you are running v1.6.5 or lower, you are vulnerable, and need to upgrade as soon as possible!
In particular, I urge installers of EV charge points to encourage both current and historic customers to update, or consider a programme of updating chargers urgently where permitted by support contracts.
The patched firmware version as of writing is v1.6.6. On some models this varies - see below.
For those managing deployments over OCPP, please either talk to your ABB representative (you should already have been contacted), or patch as you have done for prior releases.
For those using the mobile app - There are new ChargerSync and TerraConfig mobile apps - you need to switch to the new version to update, and when you do, the old ones will stop working. These are as follows:
Android:
iOS:
Please note: Some model variants of Wallbox use different versioning. The patched version for these is as follows:
If you’re unsure, you almost definitely need to be targetting v1.6.6.
You can find a full write-up on BLUTACC here.
In the spirit of responsible disclosure, we will be publishing full details of the vulnerability (which we have codenamed BLUTACC), alongside a healthily long writeup of how we found it, in the coming weeks once everyone has had opportunity to patch.
I cannot stress strongly enough that this is seriously urgent for anyone affected - please take 15 minutes out of your day to get it done as soon as possible.
CVE-2023-0863 Authentication Bypass 8.8 High CVE-2023-0864 Plaintext Communication of Configuration Data 7.1 High