CVE-2025-68136: CWE-770: Allocation of Resources Without Limits or Throttling in EVerest everest-core
CVE-2025-68136 is a high-severity vulnerability in the EVerest everest-core EV charging software stack versions prior to 2025. 10. 0. The flaw arises from improper resource management when handling SDP requests, where new session objects and TCP sockets are created without closing or destroying previous ones. This leads to resource exhaustion and potential null pointer dereferences, causing denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires network access but no authentication or user interaction, and the vulnerability has a CVSS score of 7. 4. The issue was fixed in version 2025. 10.
AI Analysis
Technical Summary
CVE-2025-68136 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the everest-core component of the EVerest EV charging software stack. The flaw exists in versions prior to 2025.10.0 and is triggered when the module receives an SDP (Session Description Protocol) request. Upon receiving such a request, the software creates new objects including Session and IConnection instances, which open new TCP sockets to handle ISO15118-20 communications. However, the previous session objects and their associated sockets are neither closed nor destroyed, and the unique_ptr managing these objects loses ownership, leading to dangling pointers. If the socket/file descriptor in use is not the last one created, this results in a null pointer dereference. The consequence is a denial of service condition due to resource exhaustion and application crashes. The vulnerability has a CVSS 3.1 score of 7.4, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact affects availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild as of now. The issue was resolved in version 2025.10.0 by properly managing resource lifecycles and ensuring previous sessions and sockets are correctly closed and destroyed.
Potential Impact
For European organizations, especially those operating EV charging infrastructure utilizing the EVerest everest-core software, this vulnerability poses a significant risk of denial of service. Disruption of EV charging services can lead to operational downtime, customer dissatisfaction, and potential financial losses. Given the increasing adoption of electric vehicles across Europe, charging stations are critical infrastructure components. A successful exploitation could cause widespread service outages, impacting urban mobility and potentially straining energy management systems. While the vulnerability does not compromise data confidentiality or integrity, the availability impact alone can have cascading effects on transportation and energy sectors. Additionally, the adjacent network attack vector means that attackers need to be within the local network or have network access to the charging station systems, which may be feasible in public or semi-public charging environments.
Mitigation Recommendations
Organizations should immediately upgrade the EVerest everest-core software to version 2025.10.0 or later, where the vulnerability is fixed. Until patching is possible, network segmentation should be enforced to restrict access to the EV charging management network, limiting exposure to adjacent attackers. Monitoring for abnormal resource consumption and socket usage on charging station systems can help detect exploitation attempts. Implementing strict session management and resource cleanup policies at the application level can mitigate similar issues. Additionally, deploying intrusion detection systems capable of recognizing anomalous SDP request patterns or excessive session creation may provide early warning. Regular audits of EV infrastructure software versions and configurations are essential to maintain security posture.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2025-68136: CWE-770: Allocation of Resources Without Limits or Throttling in EVerest everest-core
Description
CVE-2025-68136 is a high-severity vulnerability in the EVerest everest-core EV charging software stack versions prior to 2025. 10. 0. The flaw arises from improper resource management when handling SDP requests, where new session objects and TCP sockets are created without closing or destroying previous ones. This leads to resource exhaustion and potential null pointer dereferences, causing denial of service. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires network access but no authentication or user interaction, and the vulnerability has a CVSS score of 7. 4. The issue was fixed in version 2025. 10.
AI-Powered Analysis
Technical Analysis
CVE-2025-68136 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the everest-core component of the EVerest EV charging software stack. The flaw exists in versions prior to 2025.10.0 and is triggered when the module receives an SDP (Session Description Protocol) request. Upon receiving such a request, the software creates new objects including Session and IConnection instances, which open new TCP sockets to handle ISO15118-20 communications. However, the previous session objects and their associated sockets are neither closed nor destroyed, and the unique_ptr managing these objects loses ownership, leading to dangling pointers. If the socket/file descriptor in use is not the last one created, this results in a null pointer dereference. The consequence is a denial of service condition due to resource exhaustion and application crashes. The vulnerability has a CVSS 3.1 score of 7.4, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C). The impact affects availability (A:H) but not confidentiality or integrity. No known exploits are reported in the wild as of now. The issue was resolved in version 2025.10.0 by properly managing resource lifecycles and ensuring previous sessions and sockets are correctly closed and destroyed.
Potential Impact
For European organizations, especially those operating EV charging infrastructure utilizing the EVerest everest-core software, this vulnerability poses a significant risk of denial of service. Disruption of EV charging services can lead to operational downtime, customer dissatisfaction, and potential financial losses. Given the increasing adoption of electric vehicles across Europe, charging stations are critical infrastructure components. A successful exploitation could cause widespread service outages, impacting urban mobility and potentially straining energy management systems. While the vulnerability does not compromise data confidentiality or integrity, the availability impact alone can have cascading effects on transportation and energy sectors. Additionally, the adjacent network attack vector means that attackers need to be within the local network or have network access to the charging station systems, which may be feasible in public or semi-public charging environments.
Mitigation Recommendations
Organizations should immediately upgrade the EVerest everest-core software to version 2025.10.0 or later, where the vulnerability is fixed. Until patching is possible, network segmentation should be enforced to restrict access to the EV charging management network, limiting exposure to adjacent attackers. Monitoring for abnormal resource consumption and socket usage on charging station systems can help detect exploitation attempts. Implementing strict session management and resource cleanup policies at the application level can mitigate similar issues. Additionally, deploying intrusion detection systems capable of recognizing anomalous SDP request patterns or excessive session creation may provide early warning. Regular audits of EV infrastructure software versions and configurations are essential to maintain security posture.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-15T18:09:12.694Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69712a9c4623b1157ce7dac2
Added to database: 1/21/2026, 7:35:56 PM
Last enriched: 1/28/2026, 8:23:26 PM
Last updated: 2/7/2026, 10:46:28 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.