Skip to main content

CVE-2025-59399: CWE-460 Improper Cleanup on Thrown Exception in EVerest libocpp

Low
VulnerabilityCVE-2025-59399cvecve-2025-59399cwe-460
Published: Mon Sep 15 2025 (09/15/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: libocpp

Description

libocpp before 0.28.0 allows a denial of service (EVerest crash) because a secondary exception is thrown during error message generation.

AI-Powered Analysis

AILast updated: 09/15/2025, 18:39:47 UTC

Technical Analysis

CVE-2025-59399 is a vulnerability identified in the EVerest project's libocpp library, specifically versions before 0.28.0. The issue stems from improper cleanup when an exception is thrown during error message generation, classified under CWE-460 (Improper Cleanup on Thrown Exception). In this scenario, if an error occurs and the system attempts to generate an error message, a secondary exception may be thrown. This secondary exception is not properly handled, leading to a denial of service (DoS) condition where the EVerest application crashes. The vulnerability does not impact confidentiality or integrity but affects availability by causing the application to terminate unexpectedly. The CVSS v3.1 base score is 3.1, indicating a low severity level. The attack vector is adjacent network (AV:A), requiring high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). This means exploitation is possible only from a network adjacent to the vulnerable system, and it is difficult to exploit due to the complexity of triggering the secondary exception. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability primarily affects systems using libocpp versions prior to 0.28.0, which is a library used in the EVerest project, likely related to Open Charge Point Protocol (OCPP) implementations for electric vehicle charging infrastructure.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on the availability of systems utilizing the EVerest libocpp library, which is likely deployed in electric vehicle (EV) charging infrastructure. Given the increasing adoption of EVs and the EU's strong push for green energy and EV infrastructure, any disruption in charging station software could lead to service outages, affecting EV users and potentially causing reputational damage to service providers. However, since the vulnerability only causes a low-severity denial of service without compromising data confidentiality or integrity, the direct impact on sensitive information or system control is minimal. The requirement for an adjacent network attack vector and high attack complexity further reduces the likelihood of widespread exploitation. Nonetheless, critical infrastructure operators and service providers in the EV charging ecosystem should be aware of potential service disruptions and plan accordingly.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Identify all instances of libocpp in their EV charging infrastructure and verify the version in use. 2) Upgrade to libocpp version 0.28.0 or later once available, as this version addresses the improper cleanup issue. 3) In the absence of an immediate patch, implement network segmentation to restrict access to the adjacent network where libocpp operates, minimizing exposure to potential attackers. 4) Monitor system logs for unexpected crashes or exceptions related to error message generation in EVerest components. 5) Engage with EVerest project maintainers or vendors for timely updates and patches. 6) Consider implementing application-level watchdog mechanisms to automatically restart services in case of crashes to maintain availability. 7) Conduct regular security assessments of EV charging infrastructure software to detect and remediate similar exception handling issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-15T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c85d5defcb880aa9e1633a

Added to database: 9/15/2025, 6:39:25 PM

Last enriched: 9/15/2025, 6:39:47 PM

Last updated: 9/18/2025, 12:10:45 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats