CVE-2026-22539: CWE-201: Insertion of Sensitive Information Into Sent Data in EFACEC QC 60/90/120
As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6.
AI Analysis
Technical Summary
CVE-2026-22539 is a vulnerability categorized under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting EFACEC QC 60/90/120 electric vehicle chargers, specifically version 8. The issue arises because the service interaction using the Open Charge Point Protocol (OCPP) version 1.6 is conducted without any authentication mechanism. This design flaw allows an attacker who understands the OCPP protocol to remotely query the charger and obtain sensitive information about the device. The vulnerability does not require user interaction, privileges, or authentication, and can be exploited over a network, making it accessible to remote attackers. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates that the attack requires adjacent network access (e.g., local network or VPN), has low attack complexity, and no privileges or user interaction are needed. The impact is limited to confidentiality, with no direct effect on integrity or availability. No patches or known exploits currently exist, but the exposure of sensitive charger information could facilitate further targeted attacks or reconnaissance. The vulnerability highlights a critical security oversight in the implementation of OCPP communications in EFACEC chargers, emphasizing the need for authentication and encryption in EV charging infrastructure protocols.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, this vulnerability poses a risk of sensitive information disclosure from EFACEC QC 60/90/120 chargers. Such information could include device identifiers, configuration details, or operational data that attackers might leverage to map infrastructure, identify potential targets, or craft more sophisticated attacks. While the vulnerability does not directly allow control over the chargers or disruption of service, the confidentiality breach can undermine trust in EV infrastructure security and potentially expose organizations to follow-on attacks. Given the increasing reliance on EV charging networks across Europe, attackers could use this information to target critical transportation infrastructure or cause reputational damage. The risk is particularly relevant for public charging stations, fleet operators, and energy providers who deploy EFACEC chargers. The absence of authentication also suggests a broader security design weakness that could be exploited in combination with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2026-22539, organizations should implement the following specific measures: 1) Deploy network segmentation and access controls to restrict access to the OCPP management interfaces, ensuring only authorized systems can communicate with chargers. 2) Introduce authentication mechanisms at the protocol level, such as mutual TLS or token-based authentication, to prevent unauthorized querying of charger information. 3) Monitor network traffic for unusual OCPP requests or patterns indicative of reconnaissance attempts. 4) Work with EFACEC to obtain firmware updates or patches that address the authentication deficiency once available. 5) If immediate patching is not possible, consider disabling or restricting OCPP v1.6 service interactions on chargers or placing them behind secure VPNs. 6) Conduct regular security assessments of EV charging infrastructure to identify and remediate similar protocol-level vulnerabilities. 7) Educate operational staff on the risks of exposed management interfaces and enforce strict operational security policies around charger network access.
Affected Countries
Portugal, Germany, France, Netherlands, Belgium, Spain, Italy, United Kingdom
CVE-2026-22539: CWE-201: Insertion of Sensitive Information Into Sent Data in EFACEC QC 60/90/120
Description
As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6.
AI-Powered Analysis
Technical Analysis
CVE-2026-22539 is a vulnerability categorized under CWE-201 (Insertion of Sensitive Information Into Sent Data) affecting EFACEC QC 60/90/120 electric vehicle chargers, specifically version 8. The issue arises because the service interaction using the Open Charge Point Protocol (OCPP) version 1.6 is conducted without any authentication mechanism. This design flaw allows an attacker who understands the OCPP protocol to remotely query the charger and obtain sensitive information about the device. The vulnerability does not require user interaction, privileges, or authentication, and can be exploited over a network, making it accessible to remote attackers. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) indicates that the attack requires adjacent network access (e.g., local network or VPN), has low attack complexity, and no privileges or user interaction are needed. The impact is limited to confidentiality, with no direct effect on integrity or availability. No patches or known exploits currently exist, but the exposure of sensitive charger information could facilitate further targeted attacks or reconnaissance. The vulnerability highlights a critical security oversight in the implementation of OCPP communications in EFACEC chargers, emphasizing the need for authentication and encryption in EV charging infrastructure protocols.
Potential Impact
For European organizations, especially those involved in electric vehicle infrastructure, this vulnerability poses a risk of sensitive information disclosure from EFACEC QC 60/90/120 chargers. Such information could include device identifiers, configuration details, or operational data that attackers might leverage to map infrastructure, identify potential targets, or craft more sophisticated attacks. While the vulnerability does not directly allow control over the chargers or disruption of service, the confidentiality breach can undermine trust in EV infrastructure security and potentially expose organizations to follow-on attacks. Given the increasing reliance on EV charging networks across Europe, attackers could use this information to target critical transportation infrastructure or cause reputational damage. The risk is particularly relevant for public charging stations, fleet operators, and energy providers who deploy EFACEC chargers. The absence of authentication also suggests a broader security design weakness that could be exploited in combination with other vulnerabilities.
Mitigation Recommendations
To mitigate CVE-2026-22539, organizations should implement the following specific measures: 1) Deploy network segmentation and access controls to restrict access to the OCPP management interfaces, ensuring only authorized systems can communicate with chargers. 2) Introduce authentication mechanisms at the protocol level, such as mutual TLS or token-based authentication, to prevent unauthorized querying of charger information. 3) Monitor network traffic for unusual OCPP requests or patterns indicative of reconnaissance attempts. 4) Work with EFACEC to obtain firmware updates or patches that address the authentication deficiency once available. 5) If immediate patching is not possible, consider disabling or restricting OCPP v1.6 service interactions on chargers or placing them behind secure VPNs. 6) Conduct regular security assessments of EV charging infrastructure to identify and remediate similar protocol-level vulnerabilities. 7) Educate operational staff on the risks of exposed management interfaces and enforce strict operational security policies around charger network access.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- S21sec
- Date Reserved
- 2026-01-07T14:01:04.828Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695e97867349d0379db35c80
Added to database: 1/7/2026, 5:27:34 PM
Last enriched: 1/14/2026, 7:32:25 PM
Last updated: 2/7/2026, 9:54:58 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.