CVE-2025-68135: CWE-703: Improper Check or Handling of Exceptional Conditions in EVerest everest-core
CVE-2025-68135 is a medium-severity vulnerability in the EVerest everest-core EV charging software stack prior to version 2025. 10. 0. It arises from improper handling of C++ exceptions in the TbdController loop, causing silent termination of the loop and its caller. This results in denial of service (DoS) conditions affecting the SDP and ISO15118-20 servers, which are critical for EV charging communication protocols. No known exploits are currently reported in the wild. The vulnerability does not impact confidentiality or integrity but severely affects availability. The issue is fixed in version 2025. 10. 0.
AI Analysis
Technical Summary
CVE-2025-68135 is a vulnerability classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) found in the everest-core component of the EVerest EV charging software stack. The flaw exists because the TbdController loop does not properly handle C++ exceptions, leading to silent termination of both the loop and its caller. This improper exception management causes a denial of service by disrupting the operation of SDP (Session Description Protocol) and ISO15118-20 servers, which are essential for communication between EV charging stations and electric vehicles. The vulnerability affects all versions prior to 2025.10.0, with the patch released in that version addressing the issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the vulnerability requires network access (AV:A), no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, but the risk remains significant due to the critical role of the affected servers in EV charging operations. The vulnerability could lead to service outages, impacting EV charging availability and potentially causing operational disruptions in EV infrastructure relying on EVerest software.
Potential Impact
The primary impact of CVE-2025-68135 is a denial of service affecting the availability of EV charging services that use the EVerest everest-core software stack. For European organizations operating EV charging infrastructure, this could mean interruptions in charging sessions, leading to customer dissatisfaction, operational delays, and potential revenue loss. Given the increasing reliance on EVs and the critical role of charging infrastructure in supporting sustainable transportation goals, such disruptions could also affect broader energy management and smart grid operations. The vulnerability does not compromise data confidentiality or integrity but undermines service reliability. In countries with high EV adoption and dense charging networks, the impact could be more pronounced, potentially affecting public and private charging stations, fleet operators, and energy providers. Additionally, prolonged or repeated outages could erode trust in EV infrastructure providers and slow EV adoption momentum.
Mitigation Recommendations
To mitigate CVE-2025-68135, organizations should immediately upgrade the EVerest everest-core software to version 2025.10.0 or later, where the exception handling flaw is fixed. Beyond patching, it is recommended to implement enhanced monitoring and alerting on the TbdController loop and related SDP and ISO15118-20 server processes to detect unexpected terminations or failures promptly. Incorporating robust exception handling and failover mechanisms within the EV charging software stack can prevent silent failures and maintain service continuity. Regularly testing the resilience of the charging infrastructure under fault conditions will help identify weaknesses early. Additionally, organizations should maintain an inventory of EV charging software versions deployed across their infrastructure to ensure timely updates. Collaboration with EVerest vendors for security advisories and updates is also advised. Finally, contingency plans for service continuity during outages should be developed and communicated to stakeholders.
Affected Countries
Germany, Netherlands, Norway, France, United Kingdom
CVE-2025-68135: CWE-703: Improper Check or Handling of Exceptional Conditions in EVerest everest-core
Description
CVE-2025-68135 is a medium-severity vulnerability in the EVerest everest-core EV charging software stack prior to version 2025. 10. 0. It arises from improper handling of C++ exceptions in the TbdController loop, causing silent termination of the loop and its caller. This results in denial of service (DoS) conditions affecting the SDP and ISO15118-20 servers, which are critical for EV charging communication protocols. No known exploits are currently reported in the wild. The vulnerability does not impact confidentiality or integrity but severely affects availability. The issue is fixed in version 2025. 10. 0.
AI-Powered Analysis
Technical Analysis
CVE-2025-68135 is a vulnerability classified under CWE-703 (Improper Check or Handling of Exceptional Conditions) found in the everest-core component of the EVerest EV charging software stack. The flaw exists because the TbdController loop does not properly handle C++ exceptions, leading to silent termination of both the loop and its caller. This improper exception management causes a denial of service by disrupting the operation of SDP (Session Description Protocol) and ISO15118-20 servers, which are essential for communication between EV charging stations and electric vehicles. The vulnerability affects all versions prior to 2025.10.0, with the patch released in that version addressing the issue. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the vulnerability requires network access (AV:A), no privileges (PR:N), no user interaction (UI:N), and impacts availability only (A:H) without affecting confidentiality or integrity. No known exploits have been reported in the wild, but the risk remains significant due to the critical role of the affected servers in EV charging operations. The vulnerability could lead to service outages, impacting EV charging availability and potentially causing operational disruptions in EV infrastructure relying on EVerest software.
Potential Impact
The primary impact of CVE-2025-68135 is a denial of service affecting the availability of EV charging services that use the EVerest everest-core software stack. For European organizations operating EV charging infrastructure, this could mean interruptions in charging sessions, leading to customer dissatisfaction, operational delays, and potential revenue loss. Given the increasing reliance on EVs and the critical role of charging infrastructure in supporting sustainable transportation goals, such disruptions could also affect broader energy management and smart grid operations. The vulnerability does not compromise data confidentiality or integrity but undermines service reliability. In countries with high EV adoption and dense charging networks, the impact could be more pronounced, potentially affecting public and private charging stations, fleet operators, and energy providers. Additionally, prolonged or repeated outages could erode trust in EV infrastructure providers and slow EV adoption momentum.
Mitigation Recommendations
To mitigate CVE-2025-68135, organizations should immediately upgrade the EVerest everest-core software to version 2025.10.0 or later, where the exception handling flaw is fixed. Beyond patching, it is recommended to implement enhanced monitoring and alerting on the TbdController loop and related SDP and ISO15118-20 server processes to detect unexpected terminations or failures promptly. Incorporating robust exception handling and failover mechanisms within the EV charging software stack can prevent silent failures and maintain service continuity. Regularly testing the resilience of the charging infrastructure under fault conditions will help identify weaknesses early. Additionally, organizations should maintain an inventory of EV charging software versions deployed across their infrastructure to ensure timely updates. Collaboration with EVerest vendors for security advisories and updates is also advised. Finally, contingency plans for service continuity during outages should be developed and communicated to stakeholders.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T18:09:12.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697124574623b1157ce6527d
Added to database: 1/21/2026, 7:09:11 PM
Last enriched: 1/28/2026, 8:24:55 PM
Last updated: 2/7/2026, 12:52:47 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.