CVE-2025-68135: CWE-703: Improper Check or Handling of Exceptional Conditions in EVerest everest-core
EVerest is an EV charging software stack. Prior to version 2025.10.0, C++ exceptions are not properly handled for and by the `TbdController` loop, leading to its caller and itself to silently terminates. Thus, this leads to a denial of service as it is responsible of SDP and ISO15118-20 servers. Version 2025.10.0 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-68135 is a vulnerability classified under CWE-703, indicating improper check or handling of exceptional conditions. Specifically, in the EVerest everest-core software versions prior to 2025.10.0, the TbdController loop does not properly handle C++ exceptions. When an exception occurs, the loop and its caller silently terminate without logging or recovery, causing a denial of service. The TbdController is responsible for managing SDP (Session Description Protocol) and ISO15118-20 servers, which are essential components in electric vehicle charging communication standards. The failure of these servers disrupts communication between EVs and charging stations, potentially halting charging sessions. The vulnerability has a CVSS v3.1 score of 6.5, reflecting medium severity, with an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the publication date. The issue was reserved in December 2025 and published in January 2026, with the fix released in version 2025.10.0. The vulnerability highlights the importance of robust exception handling in critical infrastructure software to maintain service availability.
Potential Impact
The primary impact of CVE-2025-68135 is a denial of service affecting the SDP and ISO15118-20 servers within the EVerest everest-core platform. For European organizations operating electric vehicle charging infrastructure, this can lead to service outages, preventing EVs from establishing or maintaining charging sessions. Such disruptions can degrade user experience, reduce operational efficiency, and potentially cause financial losses due to downtime. Given the increasing adoption of electric vehicles across Europe, especially in countries with aggressive EV policies, the availability of charging infrastructure is critical. A DoS in these communication servers could also undermine trust in EV infrastructure providers and slow EV adoption. While confidentiality and integrity are not impacted, the availability impact is significant, especially for public or commercial charging networks. The lack of required privileges or user interaction means attackers could exploit this remotely if they have network access, increasing the risk profile. Organizations may also face reputational damage and regulatory scrutiny if service disruptions affect compliance with energy or transportation regulations.
Mitigation Recommendations
To mitigate CVE-2025-68135, European organizations should prioritize upgrading the EVerest everest-core software to version 2025.10.0 or later, where the exception handling flaw is fixed. Until patching is complete, implement network segmentation and access controls to limit exposure of the affected SDP and ISO15118-20 servers to untrusted networks. Deploy monitoring and alerting for unexpected termination of the TbdController process or related services to enable rapid incident response. Consider implementing redundancy and failover mechanisms for critical EV charging communication components to maintain availability during failures. Conduct regular code reviews and testing focused on exception handling robustness in critical infrastructure software. Additionally, maintain an inventory of all systems running EVerest everest-core to ensure no vulnerable instances remain. Collaborate with vendors and industry groups to share threat intelligence and best practices related to EV charging infrastructure security. Finally, incorporate this vulnerability into incident response and business continuity planning to minimize operational impact.
Affected Countries
Germany, France, Netherlands, Norway, United Kingdom, Sweden, Denmark
CVE-2025-68135: CWE-703: Improper Check or Handling of Exceptional Conditions in EVerest everest-core
Description
EVerest is an EV charging software stack. Prior to version 2025.10.0, C++ exceptions are not properly handled for and by the `TbdController` loop, leading to its caller and itself to silently terminates. Thus, this leads to a denial of service as it is responsible of SDP and ISO15118-20 servers. Version 2025.10.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-68135 is a vulnerability classified under CWE-703, indicating improper check or handling of exceptional conditions. Specifically, in the EVerest everest-core software versions prior to 2025.10.0, the TbdController loop does not properly handle C++ exceptions. When an exception occurs, the loop and its caller silently terminate without logging or recovery, causing a denial of service. The TbdController is responsible for managing SDP (Session Description Protocol) and ISO15118-20 servers, which are essential components in electric vehicle charging communication standards. The failure of these servers disrupts communication between EVs and charging stations, potentially halting charging sessions. The vulnerability has a CVSS v3.1 score of 6.5, reflecting medium severity, with an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N, I:N), but high impact on availability (A:H). There are no known exploits in the wild as of the publication date. The issue was reserved in December 2025 and published in January 2026, with the fix released in version 2025.10.0. The vulnerability highlights the importance of robust exception handling in critical infrastructure software to maintain service availability.
Potential Impact
The primary impact of CVE-2025-68135 is a denial of service affecting the SDP and ISO15118-20 servers within the EVerest everest-core platform. For European organizations operating electric vehicle charging infrastructure, this can lead to service outages, preventing EVs from establishing or maintaining charging sessions. Such disruptions can degrade user experience, reduce operational efficiency, and potentially cause financial losses due to downtime. Given the increasing adoption of electric vehicles across Europe, especially in countries with aggressive EV policies, the availability of charging infrastructure is critical. A DoS in these communication servers could also undermine trust in EV infrastructure providers and slow EV adoption. While confidentiality and integrity are not impacted, the availability impact is significant, especially for public or commercial charging networks. The lack of required privileges or user interaction means attackers could exploit this remotely if they have network access, increasing the risk profile. Organizations may also face reputational damage and regulatory scrutiny if service disruptions affect compliance with energy or transportation regulations.
Mitigation Recommendations
To mitigate CVE-2025-68135, European organizations should prioritize upgrading the EVerest everest-core software to version 2025.10.0 or later, where the exception handling flaw is fixed. Until patching is complete, implement network segmentation and access controls to limit exposure of the affected SDP and ISO15118-20 servers to untrusted networks. Deploy monitoring and alerting for unexpected termination of the TbdController process or related services to enable rapid incident response. Consider implementing redundancy and failover mechanisms for critical EV charging communication components to maintain availability during failures. Conduct regular code reviews and testing focused on exception handling robustness in critical infrastructure software. Additionally, maintain an inventory of all systems running EVerest everest-core to ensure no vulnerable instances remain. Collaborate with vendors and industry groups to share threat intelligence and best practices related to EV charging infrastructure security. Finally, incorporate this vulnerability into incident response and business continuity planning to minimize operational impact.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T18:09:12.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697124574623b1157ce6527d
Added to database: 1/21/2026, 7:09:11 PM
Last enriched: 1/21/2026, 7:20:37 PM
Last updated: 1/21/2026, 11:51:02 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23887: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Intermesh groupoffice
MediumCVE-2026-23873: CWE-1236: Improper Neutralization of Formula Elements in a CSV File in zhblue hustoj
MediumCVE-2026-1036: CWE-862 Missing Authorization in 10web Photo Gallery by 10Web – Mobile-Friendly Image Gallery
MediumCVE-2026-23737: CWE-502: Deserialization of Untrusted Data in lxsmnsyc seroval
HighCVE-2026-23736: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in lxsmnsyc seroval
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.