Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68133: CWE-770: Allocation of Resources Without Limits or Throttling in EVerest everest-core

0
High
VulnerabilityCVE-2025-68133cvecve-2025-68133cwe-770
Published: Wed Jan 21 2026 (01/21/2026, 02:25:03 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. In versions 2025.9.0 and below, an attacker can exhaust the operating system's memory and cause the module to terminate by initiating an unlimited number of TCP connections that never proceed to ISO 15118-2 communication. This is possible because a new thread is started for each incoming plain TCP or TLS socket connection before any verification occurs, and the verification performed is too permissive. The EVerest processes and all its modules shut down, affecting all EVSE functionality. This issue is fixed in version 2025.10.0.

AI-Powered Analysis

AILast updated: 01/21/2026, 03:05:19 UTC

Technical Analysis

CVE-2025-68133 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the everest-core component of the EVerest EV charging software stack. In versions 2025.9.0 and earlier, the software accepts incoming TCP or TLS socket connections and immediately spawns a new thread for each connection before performing any meaningful verification. The verification that does occur is overly permissive, allowing an attacker to establish a large number of connections that never advance to the ISO 15118-2 protocol handshake, which is the standard communication protocol for EV charging. Because each connection consumes system resources (threads and memory), an attacker can exhaust the operating system's memory by opening many such connections simultaneously. This resource exhaustion causes the EVerest processes and all associated modules to crash or terminate unexpectedly, resulting in a denial of service (DoS) that disables all EVSE functionality managed by the software. The vulnerability does not impact confidentiality or integrity but severely impacts availability. The flaw is fixed in version 2025.10.0 by introducing proper connection verification and likely resource throttling or limits on thread creation. No known exploits are currently reported in the wild, but the ease of exploitation (no authentication or user interaction required) and the critical role of EVerest in EV charging infrastructure make this a significant threat.

Potential Impact

For European organizations operating EV charging stations using the affected EVerest versions, this vulnerability poses a significant risk of service disruption. The denial of service caused by resource exhaustion can lead to widespread unavailability of EV charging points, impacting EV drivers and potentially causing reputational damage to operators. In countries with high EV adoption and dense charging networks, such as Germany, France, the Netherlands, Norway, and the UK, the impact could be substantial, affecting both public and private charging infrastructure. Disruption of EVSE functionality may also have cascading effects on energy management systems and smart grid operations that rely on these charging stations. Additionally, prolonged outages could hinder compliance with environmental and transportation policies promoting EV usage. Although no data confidentiality or integrity is compromised, the availability impact alone can cause operational and financial losses.

Mitigation Recommendations

The primary mitigation is to upgrade all affected EVerest everest-core installations to version 2025.10.0 or later, where the vulnerability is fixed. Until upgrades can be applied, organizations should implement network-level protections such as rate limiting and connection throttling on the ports used by EVerest to prevent excessive simultaneous connections from single or distributed sources. Deploying intrusion detection or anomaly detection systems to monitor for unusual connection patterns indicative of an attack can provide early warning. Additionally, configuring firewall rules to restrict access to trusted IP ranges or authenticated clients can reduce exposure. Operators should also ensure robust logging and alerting on process crashes or resource exhaustion events to enable rapid incident response. Finally, coordinating with EVSE manufacturers and software vendors for timely patch deployment and security advisories is essential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T18:05:52.211Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69703f0f4623b1157c7a66a5

Added to database: 1/21/2026, 2:50:55 AM

Last enriched: 1/21/2026, 3:05:19 AM

Last updated: 2/6/2026, 10:03:48 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats