{"id":14095,"date":"2026-03-02T08:08:00","date_gmt":"2026-03-02T06:08:00","guid":{"rendered":"https:\/\/www.phoenixcontact-emobility.com\/?p=14095"},"modified":"2026-03-03T09:07:11","modified_gmt":"2026-03-03T07:07:11","slug":"pwn2own-automotive-2026-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.phoenixcontact-emobility.com\/en\/news-and-events\/charging-infrastructure\/pwn2own-automotive-2026-cybersecurity\/","title":{"rendered":"Pwn2Own Automotive 2026: Cybersecurity for our charging solutions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14095\" class=\"elementor elementor-14095 elementor-14094\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58b9d77 e-flex e-con-boxed e-con e-parent\" data-id=\"58b9d77\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-767211b e-con-full e-flex e-con e-child\" data-id=\"767211b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8f98470 elementor-widget elementor-widget-text-editor\" data-id=\"8f98470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phoenix Contact was once again represented at the renowned <a href=\"mailto:https:\/\/vicone.com\/pwn2own-automotive\">Pwn2Own Automotive 2026<\/a> security competition in Tokyo this year. For the third time in a row, the <a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">AC charging controller CHARX control modular<\/a> was nominated as an official target device \u2013 a clear sign of the technical significance and security quality that our products are accorded in the international research community.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe6843f elementor-widget elementor-widget-image\" data-id=\"fe6843f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"361\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/undefined-e1772461042793-1.jpeg\" class=\"attachment-large size-large wp-image-14145\" alt=\"\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/undefined-e1772461042793-1.jpeg 640w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/undefined-e1772461042793-1-300x169.jpeg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d210813 elementor-widget elementor-widget-text-editor\" data-id=\"d210813\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>2026 was also a special year: for the first time, Robin Pape, Product &amp; Solution Security Expert (PSSE), accompanied the competition on site. He observed the attempts against our controller, analyzed attack chains, and ensured clean, responsible documentation throughout the coordinated disclosure process for the further development of our cybersecurity processes at Phoenix Contact E-Mobility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-917d477 elementor-widget elementor-widget-heading\" data-id=\"917d477\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Pwn2Own is different from traditional security tests  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35d1bb0 elementor-widget elementor-widget-text-editor\" data-id=\"35d1bb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pwn2Own differs significantly from traditional security tests.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7644035 e-grid e-con-full e-con e-child\" data-id=\"7644035\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e7b0dd elementor-blockquote--skin-quotation elementor-blockquote--align-left elementor-widget elementor-widget-blockquote\" data-id=\"4e7b0dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tIn contrast to a regular penetration test, in which individual teams work with a clearly defined task, here several highly specialized security researcher teams compete against each other, each using completely different methods and approaches to compromise our charging controller.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">\u2013 Robin Pape, Product &amp; Solution Security Expert<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffb8e86 elementor-widget elementor-widget-image\" data-id=\"ffb8e86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/Foto_Robin_Pape-1-300x300.jpg\" class=\"attachment-medium size-medium wp-image-14147\" alt=\"\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/Foto_Robin_Pape-1-300x300.jpg 300w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/Foto_Robin_Pape-1-150x150.jpg 150w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/Foto_Robin_Pape-1-768x768.jpg 768w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/Foto_Robin_Pape-1.jpg 900w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09f3e8e elementor-widget elementor-widget-text-editor\" data-id=\"09f3e8e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In addition, the competition rules provide strong incentives to search as deeply as possible for unknown attack vectors: <em><strong>&#8220;The Pwn2Own rules, which award less prize money for vulnerabilities found multiple times , incentivize security researchers to explore different attack vectors and &#8216;dig deep&#8217; in order to find vulnerabilities that may have been overlooked by other teams.&#8221; <\/strong><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9992768 elementor-widget elementor-widget-image\" data-id=\"9992768\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"451\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-1024x577.jpg\" class=\"attachment-large size-large wp-image-14149\" alt=\"\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-1024x577.jpg 1024w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-300x169.jpg 300w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-768x433.jpg 768w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-1536x865.jpg 1536w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/IMG_2336-1-e1772521227540-2048x1154.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3f3cb3 elementor-widget elementor-widget-text-editor\" data-id=\"e3f3cb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This structure makes the Pwn2Own event one of the most valuable platforms worldwide for gaining new security-related insights for your own products.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a8bc07c elementor-widget elementor-widget-heading\" data-id=\"a8bc07c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">High level of professionalism among security researchers  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b0dbfa elementor-widget elementor-widget-text-editor\" data-id=\"6b0dbfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The live demonstrations in Tokyo impressively showed how precisely and carefully the research teams work. Many arrived with complete attack chains for several target devices. This shows that without intensive preparation, a spontaneous, targeted attack on the target devices in this year&#8217;s competition would not have been possible at all.<\/p><p>\u00a0<\/p><p>Robin sums up the professionalism of the event as follows: <strong><em>&#8220;I had the impression that the teams were all very well prepared. Most of them had exploits for multiple targets in their luggage. A lot of preparation time went into this. The findings were not random hits, but the result of highly professional work by talented and experienced security researchers.&#8221;<\/em><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd28197 elementor-widget elementor-widget-heading\" data-id=\"fd28197\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lab mode instead of reality \u2013 and still extremely valuable<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d154ff elementor-widget elementor-widget-text-editor\" data-id=\"8d154ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>&#8220;The <a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">AC charging controller CHARX control modular<\/a> was used in &#8216;lab mode&#8217; at Pwn2Own. This means it was set up openly with direct access to all interfaces, which is very different from normal use in a charging station. The setup therefore does not correspond to the reality in the field. Certain features were deliberately activated in advance. These are disabled by default in normal operation and are actually only intended for configuration purposes.&#8221;<\/strong><\/em> \u2013 Robin Pape<\/p><p>This confirms that the requirements at Pwn2Own go beyond normal field conditions, but precisely for this reason provide extremely valuable insights for our Product &amp; Solution Security Expert Robin Pape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79bc903 elementor-widget elementor-widget-heading\" data-id=\"79bc903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Positive feedback and new ideas from the community <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b81e76a elementor-widget elementor-widget-text-editor\" data-id=\"b81e76a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The feedback on how vulnerabilities found in previous years were handled was particularly gratifying. Both the security researchers and <a href=\"mailto:https:\/\/www.trendmicro.com\/de_de\/business.html?utm_content=ent_brand+general_lg_e_de_wg_ao_search&amp;utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=ent_brand+general_lg_e_de_wg_ao_search&amp;gad_source=1&amp;gad_campaignid=20553101953&amp;gclid=Cj0KCQiAhtvMBhDBARIsAL26pjHUEj188BwBQ0l_aOexgIQYKf7YmWGmnrfkeRS_jqPldGGeJ_8oKeUaAlbxEALw_wcB\">Trend Micro<\/a> praised Phoenix Contact&#8217;s professionalism, transparency, and responsiveness in this regard.<\/p><p><em><strong>&#8220;We were able to take away many valuable suggestions that will be incorporated into the further improvement of the cybersecurity of our products \u2013 so that we are well equipped to deal with threats in the future.&#8221;<\/strong><\/em> \u2013 Robin Pape<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f7590b elementor-widget elementor-widget-heading\" data-id=\"9f7590b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: A competition that makes us stronger<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d461ef elementor-widget elementor-widget-text-editor\" data-id=\"6d461ef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Participation in Pwn2Own Automotive 2026 once again confirms the value of collaboration with the global security community.<\/p><p>We gain early insight into potential vulnerabilities, continuously improve our security architecture, and strengthen the robustness of our products \u2013 long before threats become relevant in the field. The issues identified are incorporated into a structured analysis and solution process. In accordance with Phoenix Contact&#8217;s established cybersecurity processes, we will provide updates via the <a href=\"https:\/\/certvde.com\/en\/\" target=\"_blank\" rel=\"noopener\">CERT@VDE<\/a> platform.<\/p><p>We are grateful for the open exchange with the <a href=\"https:\/\/www.zerodayinitiative.com\/\" target=\"_blank\" rel=\"noopener\">TrendAI Zero Day Initiative\u00a0(ZDI<\/a>) and the many strong market players who were also present. Special thanks go to the creativity and perseverance of security researchers from around the world. Together, we are able to stand up for safe mobility and continue to drive it forward.<br \/>One thing is also clear: our products are technically top-of-the-line. And we take every opportunity to improve them further.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65f9853 elementor-widget elementor-widget-spacer\" data-id=\"65f9853\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1afec3 elementor-widget elementor-widget-text-editor\" data-id=\"e1afec3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h5>FAQ<\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-714ae61 elementor-widget elementor-widget-text-editor\" data-id=\"714ae61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>Frequently asked questions<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3c5419 elementor-widget elementor-widget-n-accordion\" data-id=\"e3c5419\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2380\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2380\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> What is the Pwn2Own Automotive competition? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2380\" class=\"elementor-element elementor-element-af67f17 e-con-full e-flex e-con e-child\" data-id=\"af67f17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dda7a41 elementor-widget elementor-widget-text-editor\" data-id=\"dda7a41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Pwn2Own Automotive is an internationally recognized security competition in which security researchers attempt to attack connected vehicles, charging infrastructure, and automotive components in a targeted manner. The aim is to uncover previously unknown vulnerabilities in order to improve the cybersecurity of products at an early stage. The 2026 competition took place in Tokyo, Japan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2381\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2381\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> Why does Phoenix Contact participate in Pwn2Own Automotive? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2381\" class=\"elementor-element elementor-element-65ad858 e-con-full e-flex e-con e-child\" data-id=\"65ad858\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-955db81 elementor-widget elementor-widget-text-editor\" data-id=\"955db81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phoenix Contact uses Pwn2Own Automotive to have its charging solutions tested under extremely demanding conditions. Several independent, highly specialized teams attack our charging controller \u2013 much more intensively than in a classic penetration test. This gives us early indications of possible vulnerabilities and allows us to continuously improve the security of our products and processes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2382\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2382\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> Is the test setup at Pwn2Own realistic for use in the field? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2382\" class=\"elementor-element elementor-element-1a0e7e1 e-con-full e-flex e-con e-child\" data-id=\"1a0e7e1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ca235fd elementor-widget elementor-widget-text-editor\" data-id=\"ca235fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The charging controller is tested in what is known as lab mode: openly structured, with direct access to all interfaces. In addition, some functions are activated that are deactivated in regular charging station operation or are only used for configuration. The setup is therefore deliberately more stringent than real field conditions \u2013 but that is precisely why it provides particularly in-depth security-related insights.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is the Pwn2Own Automotive competition?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Pwn2Own Automotive is an internationally recognized security competition in which security researchers attempt to attack connected vehicles, charging infrastructure, and automotive components in a targeted manner. The aim is to uncover previously unknown vulnerabilities in order to improve the cybersecurity of products at an early stage. The 2026 competition took place in Tokyo, Japan.\"}},{\"@type\":\"Question\",\"name\":\"Why does Phoenix Contact participate in Pwn2Own Automotive?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Phoenix Contact uses Pwn2Own Automotive to have its charging solutions tested under extremely demanding conditions. Several independent, highly specialized teams attack our charging controller \\u2013 much more intensively than in a classic penetration test. This gives us early indications of possible vulnerabilities and allows us to continuously improve the security of our products and processes.\"}},{\"@type\":\"Question\",\"name\":\"Is the test setup at Pwn2Own realistic for use in the field?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The charging controller is tested in what is known as lab mode: openly structured, with direct access to all interfaces. In addition, some functions are activated that are deactivated in regular charging station operation or are only used for configuration. The setup is therefore deliberately more stringent than real field conditions \\u2013 but that is precisely why it provides particularly in-depth security-related insights.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0a5122 cnt-space e-con-full e-flex e-con e-child\" data-id=\"c0a5122\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-7a115ef cnt-space e-con-full e-flex e-con e-child\" data-id=\"7a115ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-e858475 e-con-full e-flex e-con e-child\" data-id=\"e858475\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac92498 elementor-widget elementor-widget-heading\" data-id=\"ac92498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discover suitable products now<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c41983f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"c41983f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2a8852 elementor-widget elementor-widget-text-editor\" data-id=\"b2a8852\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Here you will find a selection of relevant products &#8211; based on the topics and recommendations from our blog post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1607666 e-con-full e-grid e-con e-child\" data-id=\"1607666\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-2958bfa e-con-full txt-box-grid txt-box-grid-dark-green e-flex e-con e-child\" data-id=\"2958bfa\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b4f8c8 elementor-widget elementor-widget-image\" data-id=\"5b4f8c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.phoenixcontact.com\/de-de\/produkte\/ladetechnik-fuer-die-elektromobilitaet\/dc-ladekabel\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/00035057_1x1_5000.png\" class=\"attachment-large size-large wp-image-14151\" alt=\"\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/00035057_1x1_5000.png 1000w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/00035057_1x1_5000-300x300.png 300w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/00035057_1x1_5000-150x150.png 150w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2026\/03\/00035057_1x1_5000-768x768.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-856630e elementor-widget elementor-widget-heading\" data-id=\"856630e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">AC charging controllers<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bb0340 elementor-align-right pc-tertiary-link elementor-widget elementor-widget-button\" data-id=\"2bb0340\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phoenix Contact was once again represented at the renowned Pwn2Own Automotive 2026 security competition in Tokyo this year. For the third time in a row, the AC charging controller CHARX control modular was nominated as an official target device \u2013 a clear sign of the technical significance and security quality that our products are accorded [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":14101,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[42],"tags":[291,292],"class_list":["post-14095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-charging-infrastructure","tag-referent","tag-sbow"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts\/14095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/comments?post=14095"}],"version-history":[{"count":16,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts\/14095\/revisions"}],"predecessor-version":[{"id":14176,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts\/14095\/revisions\/14176"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/media\/14101"}],"wp:attachment":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/media?parent=14095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/categories?post=14095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/tags?post=14095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}