Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20882: CWE-307 in Mobiliti e-mobi.hu

0
High
VulnerabilityCVE-2026-20882cvecve-2026-20882cwe-307
Published: Fri Mar 06 2026 (03/06/2026, 15:05:42 UTC)
Source: CVE Database V5
Vendor/Project: Mobiliti
Product: e-mobi.hu

Description

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

AI-Powered Analysis

AILast updated: 03/06/2026, 15:46:10 UTC

Technical Analysis

CVE-2026-20882 is a vulnerability classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) found in the Mobiliti e-mobi.hu product, which is used for managing electric vehicle (EV) charger telemetry. The root cause is the absence of rate limiting on the WebSocket API's authentication requests. WebSocket connections allow real-time, bidirectional communication between clients and servers, commonly used in telemetry systems for timely data exchange. Without restrictions on the number of authentication attempts, an attacker can flood the system with excessive requests. This can lead to denial-of-service conditions by overwhelming the system, suppressing or mis-routing legitimate telemetry data from chargers, which may disrupt EV charging operations. Additionally, the lack of rate limiting facilitates brute-force attacks against authentication mechanisms, potentially allowing unauthorized access if weak credentials are used. The vulnerability affects all versions of the product and can be exploited remotely without requiring any privileges or user interaction. The CVSS v3.1 score is 7.5 (high), reflecting the ease of exploitation and significant impact on availability, though confidentiality and integrity are not directly compromised. No patches or known exploits are currently available, indicating the need for proactive mitigation by users of this product.

Potential Impact

The primary impact of CVE-2026-20882 is on the availability of the Mobiliti e-mobi.hu system, which could lead to denial-of-service conditions affecting EV charger telemetry and management. Disruption of telemetry data can prevent operators from monitoring charger status, potentially causing operational delays, reduced service reliability, and customer dissatisfaction. In worst-case scenarios, mis-routed or suppressed telemetry could lead to incorrect billing or failure to detect charger faults, impacting business operations and safety. The possibility of brute-force attacks raises the risk of unauthorized access, which could lead to further exploitation or manipulation of charger controls. Organizations relying on this system, including EV charging network operators, energy providers, and smart city infrastructure managers, may experience operational downtime and reputational damage. The lack of known exploits suggests the threat is currently theoretical but could be weaponized by attackers targeting EV infrastructure, a growing critical sector worldwide.

Mitigation Recommendations

To mitigate CVE-2026-20882, organizations should implement strict rate limiting on authentication requests at the WebSocket API level to prevent abuse through excessive attempts. This can be achieved by configuring WebSocket servers or associated reverse proxies to monitor and throttle repeated authentication attempts from the same source IP or client identifier. Additionally, deploying anomaly detection systems to identify unusual traffic patterns indicative of brute-force or DoS attacks is recommended. Strengthening authentication mechanisms by enforcing strong password policies, multi-factor authentication (if supported), and account lockout policies will reduce the risk of unauthorized access. Network segmentation and firewall rules should restrict access to the WebSocket API to trusted clients and networks where possible. Regular monitoring and logging of authentication attempts and telemetry data flows will help detect and respond to attacks promptly. Since no official patches are currently available, these compensating controls are critical until the vendor releases a fix. Engaging with Mobiliti support for updates and applying patches promptly upon release is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-24T00:30:38.944Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aaf339c48b3f10ffa20e1c

Added to database: 3/6/2026, 3:31:05 PM

Last enriched: 3/6/2026, 3:46:10 PM

Last updated: 3/7/2026, 7:19:05 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses