Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0778: CWE-306: Missing Authentication for Critical Function in Enel X JuiceBox 40

0
High
VulnerabilityCVE-2026-0778cvecve-2026-0778cwe-306
Published: Fri Jan 23 2026 (01/23/2026, 03:29:50 UTC)
Source: CVE Database V5
Vendor/Project: Enel X
Product: JuiceBox 40

Description

CVE-2026-0778 is a high-severity vulnerability in the Enel X JuiceBox 40 electric vehicle charging stations, specifically in the Telnet service running on TCP port 2000. The flaw is due to missing authentication, allowing network-adjacent attackers to execute arbitrary code remotely without any credentials or user interaction. Exploitation results in full compromise of confidentiality, integrity, and availability of the affected device. Although no known exploits are currently in the wild, the vulnerability poses a significant risk to installations running version 4. 2. 7. European organizations using these charging stations could face operational disruptions and potential lateral movement into broader networks. Mitigations include network segmentation, disabling Telnet if possible, restricting access to port 2000, and monitoring for unusual activity. Countries with high EV adoption and deployments of Enel X JuiceBox 40, such as Germany, France, Italy, and the Netherlands, are most likely to be impacted. Given the ease of exploitation and critical impact, this vulnerability demands urgent attention from defenders.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:09:54 UTC

Technical Analysis

CVE-2026-0778 identifies a critical security vulnerability in the Enel X JuiceBox 40 electric vehicle charging station, specifically in its Telnet service which listens on TCP port 2000 by default. The vulnerability arises from the absence of any authentication mechanism before allowing remote connections to the Telnet service. This missing authentication (CWE-306) enables an attacker with network adjacency—meaning they can reach the device on the network—to execute arbitrary code remotely without needing any credentials or user interaction. The attacker can run code with the privileges of the service account, potentially allowing full control over the device. This could lead to manipulation of charging operations, disruption of service, or use of the device as a pivot point for further network intrusion. The affected version is 4.2.7 of the JuiceBox 40. The CVSS v3.0 base score is 8.8 (high), reflecting the low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability was assigned by the Zero Day Initiative (ZDI) and published in January 2026. The lack of authentication on a critical function in a network-exposed service is a significant security oversight, especially in infrastructure components like EV charging stations that are increasingly integrated into critical energy and transportation networks.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Enel X JuiceBox 40 charging stations are deployed in various public and private EV charging infrastructures across Europe. Exploitation could lead to unauthorized control over charging operations, causing denial of service or manipulation of energy consumption data. This could disrupt EV charging availability, impacting transportation and logistics sectors reliant on electric vehicles. Furthermore, compromised charging stations could serve as entry points for attackers to infiltrate corporate or municipal networks, potentially leading to broader cyberattacks. Confidentiality breaches could expose user data or operational metrics. Integrity violations might allow attackers to falsify charging records or billing information. Availability impacts could cause outages in charging services, undermining trust in EV infrastructure. Given the strategic push for green energy and EV adoption in Europe, such disruptions could have economic and reputational consequences. Organizations managing EV infrastructure must consider this vulnerability a critical risk to operational continuity and cybersecurity posture.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should implement the following specific measures: 1) Immediately isolate JuiceBox 40 devices running version 4.2.7 from untrusted networks, especially public internet access. 2) Restrict network access to TCP port 2000 using firewalls or network segmentation to allow only trusted management hosts. 3) Disable the Telnet service on the device if possible, or replace it with a secure management protocol that enforces authentication. 4) Monitor network traffic for unusual connections or commands targeting port 2000 on JuiceBox 40 devices. 5) Engage with Enel X for firmware updates or patches addressing this vulnerability; if no patch is available, consider temporary device replacement or enhanced compensating controls. 6) Conduct regular vulnerability scans and penetration tests on EV charging infrastructure to detect similar issues. 7) Implement strong network access controls and logging to detect and respond to exploitation attempts promptly. 8) Educate operational technology (OT) and IT teams about the risks of exposed management interfaces and enforce strict access policies. These steps go beyond generic advice by focusing on network-level controls, service disabling, and proactive monitoring tailored to the specific vulnerability and device context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:51:00.955Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972f3a64623b1157cfeb73e

Added to database: 1/23/2026, 4:05:58 AM

Last enriched: 1/30/2026, 10:09:54 AM

Last updated: 2/6/2026, 7:40:00 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats