Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68141: CWE-476: NULL Pointer Dereference in EVerest everest-core

0
High
VulnerabilityCVE-2025-68141cvecve-2025-68141cwe-476
Published: Wed Jan 21 2026 (01/21/2026, 19:56:14 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. Prior to version 2025.10.0, during the deserialization of a `DC_ChargeLoopRes` message that includes Receipt as well as TaxCosts, the vector `<DetailedTax>tax_costs` in the target `Receipt` structure is accessed out of bounds. This occurs in the method `template <> void convert(const struct iso20_dc_DetailedTaxType& in, datatypes::DetailedTax& out)` which leads to a null pointer dereference and causes the module to terminate. The EVerest processes and all its modules shut down, affecting all EVSE. Version 2025.10.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:20:17 UTC

Technical Analysis

CVE-2025-68141 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting the everest-core component of the EVerest EV charging software stack. The flaw exists in versions prior to 2025.10.0 during the deserialization process of DC_ChargeLoopRes messages that include Receipt and TaxCosts data. Specifically, the vulnerability occurs in the template specialization method convert(const struct iso20_dc_DetailedTaxType& in, datatypes::DetailedTax& out), where the vector tax_costs within the Receipt structure is accessed out of bounds. This improper access leads to a null pointer dereference, causing the affected module to terminate unexpectedly. Since EVerest processes and all its modules shut down upon this failure, the entire EVSE (Electric Vehicle Supply Equipment) managed by the software becomes non-operational, resulting in a denial of service condition. The vulnerability has a CVSS 3.1 base score of 7.4, indicating high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact affects availability (A:H) but does not compromise confidentiality or integrity. No known exploits are currently reported in the wild. The issue is resolved in version 2025.10.0 of the EVerest software stack.

Potential Impact

For European organizations operating EV charging infrastructure using the EVerest everest-core software, this vulnerability poses a significant risk of service disruption. The null pointer dereference causes the charging software modules to crash and shut down, leading to unavailability of EV charging stations. This can impact EV drivers, fleet operators, and public charging networks, potentially causing operational delays and customer dissatisfaction. Given the increasing reliance on EV infrastructure in Europe to meet climate goals, such outages could have broader economic and reputational consequences. Additionally, the vulnerability does not require authentication or user interaction, increasing the risk of remote exploitation by attackers with network access to the charging infrastructure. While confidentiality and integrity are not directly impacted, the availability loss could disrupt critical transportation services and undermine trust in EV infrastructure providers.

Mitigation Recommendations

1. Immediate upgrade to EVerest everest-core version 2025.10.0 or later to apply the official fix. 2. Implement strict input validation and sanity checks on deserialized data structures, especially vectors like tax_costs, to prevent out-of-bounds access. 3. Employ network segmentation and firewall rules to restrict access to EVSE management interfaces and limit exposure to adjacent network attackers. 4. Monitor EVSE software logs for unexpected crashes or restarts indicative of exploitation attempts. 5. Develop incident response plans specific to EV infrastructure outages to minimize downtime. 6. Collaborate with EVerest vendors for timely security updates and vulnerability disclosures. 7. Consider deploying runtime protections such as memory safety tools or application-level watchdogs to detect and recover from null pointer dereferences.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-15T18:15:08.404Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697131a44623b1157ce981d6

Added to database: 1/21/2026, 8:05:56 PM

Last enriched: 1/21/2026, 8:20:17 PM

Last updated: 1/21/2026, 10:13:56 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats