Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22540: CWE-400 Uncontrolled Resource Consumption in EFACEC QC60/90/120

0
Critical
VulnerabilityCVE-2026-22540cvecve-2026-22540cwe-400
Published: Wed Jan 07 2026 (01/07/2026, 14:16:32 UTC)
Source: CVE Database V5
Vendor/Project: EFACEC
Product: QC60/90/120

Description

CVE-2026-22540 is a critical vulnerability in EFACEC QC60/90/120 electric vehicle chargers caused by uncontrolled resource consumption (CWE-400). An attacker can trigger a denial of service by flooding one of the charger's control boards with massive ARP requests, disrupting the board responsible for managing EV interfaces. This disruption prevents the charger from functioning properly. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. With a CVSS 4. 0 score of 9. 2, it poses a severe risk to availability. European organizations relying on EFACEC chargers, especially in countries with high EV adoption and EFACEC market presence, are at significant risk. Mitigation requires network-level filtering of ARP floods, segmentation of charger management interfaces, and close monitoring of network traffic to detect anomalies. Patch information is currently unavailable, so proactive network defenses are critical.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:57:00 UTC

Technical Analysis

CVE-2026-22540 is a critical denial-of-service vulnerability affecting EFACEC QC60/90/120 electric vehicle chargers. The root cause is uncontrolled resource consumption (CWE-400) triggered by an attacker sending a massive volume of ARP (Address Resolution Protocol) requests to one of the charger's control boards. This board is responsible for managing the EV interface, and its failure causes the entire charger to malfunction. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H), with no impact on confidentiality or integrity. The flaw essentially allows an attacker to overwhelm the control board’s resources, causing it to become unresponsive and denying service to legitimate EV charging operations. Given the critical role of EV chargers in transportation infrastructure, this vulnerability could disrupt EV charging stations, leading to operational downtime and potential cascading effects on EV users and fleet operators. No patches or fixes have been published yet, increasing the urgency for network-level mitigations and monitoring. The vulnerability was published on January 7, 2026, and is tracked under CWE-400, which relates to resource exhaustion issues.

Potential Impact

The primary impact is on availability, as the vulnerability enables denial of service on EFACEC QC60/90/120 chargers by exhausting resources on a critical control board. For European organizations, especially those operating EV charging infrastructure, this could lead to widespread charger outages, disrupting EV fleet operations, public charging availability, and potentially causing economic and reputational damage. Critical infrastructure operators and commercial EV fleet managers may face operational delays and increased costs due to charger downtime. The disruption could also undermine confidence in EV infrastructure reliability, slowing EV adoption. Since EFACEC is a major European manufacturer with significant market share in countries like Portugal, Germany, France, and the Netherlands, the impact is geographically concentrated but potentially severe. The lack of authentication or user interaction required for exploitation increases the risk of automated or large-scale attacks. Additionally, the vulnerability could be leveraged as part of a broader attack campaign targeting transportation infrastructure, with potential cascading effects on energy and mobility sectors.

Mitigation Recommendations

1. Implement network-level filtering to detect and block abnormal ARP traffic volumes targeting EFACEC chargers, using intrusion detection/prevention systems (IDS/IPS) with ARP flood detection capabilities. 2. Segment the network to isolate charger management interfaces from general network traffic, reducing exposure to external ARP floods. 3. Employ rate limiting on ARP requests at network switches or routers connected to charging stations to prevent resource exhaustion. 4. Monitor network traffic continuously for unusual ARP request patterns and establish alerting mechanisms for rapid incident response. 5. Coordinate with EFACEC for timely patch releases and apply firmware updates as soon as they become available. 6. Consider deploying dedicated security gateways or firewalls with ARP inspection features in EV charging station networks. 7. Educate operational staff on recognizing symptoms of charger denial of service and establish incident response playbooks specific to this vulnerability. 8. Engage with local CERTs and industry groups to share threat intelligence and mitigation strategies related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2026-01-07T14:01:04.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695e6d507349d0379da4e26d

Added to database: 1/7/2026, 2:27:28 PM

Last enriched: 1/14/2026, 3:57:00 PM

Last updated: 2/6/2026, 7:37:31 PM

Views: 192

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats