CVE-2026-22540: CWE-400 Uncontrolled Resource Consumption in EFACEC QC60/90/120
CVE-2026-22540 is a critical vulnerability in EFACEC QC60/90/120 electric vehicle chargers caused by uncontrolled resource consumption (CWE-400). An attacker can trigger a denial of service by flooding one of the charger's control boards with massive ARP requests, disrupting the board responsible for managing EV interfaces. This disruption prevents the charger from functioning properly. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. With a CVSS 4. 0 score of 9. 2, it poses a severe risk to availability. European organizations relying on EFACEC chargers, especially in countries with high EV adoption and EFACEC market presence, are at significant risk. Mitigation requires network-level filtering of ARP floods, segmentation of charger management interfaces, and close monitoring of network traffic to detect anomalies. Patch information is currently unavailable, so proactive network defenses are critical.
AI Analysis
Technical Summary
CVE-2026-22540 is a critical denial-of-service vulnerability affecting EFACEC QC60/90/120 electric vehicle chargers. The root cause is uncontrolled resource consumption (CWE-400) triggered by an attacker sending a massive volume of ARP (Address Resolution Protocol) requests to one of the charger's control boards. This board is responsible for managing the EV interface, and its failure causes the entire charger to malfunction. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H), with no impact on confidentiality or integrity. The flaw essentially allows an attacker to overwhelm the control board’s resources, causing it to become unresponsive and denying service to legitimate EV charging operations. Given the critical role of EV chargers in transportation infrastructure, this vulnerability could disrupt EV charging stations, leading to operational downtime and potential cascading effects on EV users and fleet operators. No patches or fixes have been published yet, increasing the urgency for network-level mitigations and monitoring. The vulnerability was published on January 7, 2026, and is tracked under CWE-400, which relates to resource exhaustion issues.
Potential Impact
The primary impact is on availability, as the vulnerability enables denial of service on EFACEC QC60/90/120 chargers by exhausting resources on a critical control board. For European organizations, especially those operating EV charging infrastructure, this could lead to widespread charger outages, disrupting EV fleet operations, public charging availability, and potentially causing economic and reputational damage. Critical infrastructure operators and commercial EV fleet managers may face operational delays and increased costs due to charger downtime. The disruption could also undermine confidence in EV infrastructure reliability, slowing EV adoption. Since EFACEC is a major European manufacturer with significant market share in countries like Portugal, Germany, France, and the Netherlands, the impact is geographically concentrated but potentially severe. The lack of authentication or user interaction required for exploitation increases the risk of automated or large-scale attacks. Additionally, the vulnerability could be leveraged as part of a broader attack campaign targeting transportation infrastructure, with potential cascading effects on energy and mobility sectors.
Mitigation Recommendations
1. Implement network-level filtering to detect and block abnormal ARP traffic volumes targeting EFACEC chargers, using intrusion detection/prevention systems (IDS/IPS) with ARP flood detection capabilities. 2. Segment the network to isolate charger management interfaces from general network traffic, reducing exposure to external ARP floods. 3. Employ rate limiting on ARP requests at network switches or routers connected to charging stations to prevent resource exhaustion. 4. Monitor network traffic continuously for unusual ARP request patterns and establish alerting mechanisms for rapid incident response. 5. Coordinate with EFACEC for timely patch releases and apply firmware updates as soon as they become available. 6. Consider deploying dedicated security gateways or firewalls with ARP inspection features in EV charging station networks. 7. Educate operational staff on recognizing symptoms of charger denial of service and establish incident response playbooks specific to this vulnerability. 8. Engage with local CERTs and industry groups to share threat intelligence and mitigation strategies related to this vulnerability.
Affected Countries
Portugal, Germany, France, Netherlands, Spain, Italy
CVE-2026-22540: CWE-400 Uncontrolled Resource Consumption in EFACEC QC60/90/120
Description
CVE-2026-22540 is a critical vulnerability in EFACEC QC60/90/120 electric vehicle chargers caused by uncontrolled resource consumption (CWE-400). An attacker can trigger a denial of service by flooding one of the charger's control boards with massive ARP requests, disrupting the board responsible for managing EV interfaces. This disruption prevents the charger from functioning properly. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. With a CVSS 4. 0 score of 9. 2, it poses a severe risk to availability. European organizations relying on EFACEC chargers, especially in countries with high EV adoption and EFACEC market presence, are at significant risk. Mitigation requires network-level filtering of ARP floods, segmentation of charger management interfaces, and close monitoring of network traffic to detect anomalies. Patch information is currently unavailable, so proactive network defenses are critical.
AI-Powered Analysis
Technical Analysis
CVE-2026-22540 is a critical denial-of-service vulnerability affecting EFACEC QC60/90/120 electric vehicle chargers. The root cause is uncontrolled resource consumption (CWE-400) triggered by an attacker sending a massive volume of ARP (Address Resolution Protocol) requests to one of the charger's control boards. This board is responsible for managing the EV interface, and its failure causes the entire charger to malfunction. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H), with no impact on confidentiality or integrity. The flaw essentially allows an attacker to overwhelm the control board’s resources, causing it to become unresponsive and denying service to legitimate EV charging operations. Given the critical role of EV chargers in transportation infrastructure, this vulnerability could disrupt EV charging stations, leading to operational downtime and potential cascading effects on EV users and fleet operators. No patches or fixes have been published yet, increasing the urgency for network-level mitigations and monitoring. The vulnerability was published on January 7, 2026, and is tracked under CWE-400, which relates to resource exhaustion issues.
Potential Impact
The primary impact is on availability, as the vulnerability enables denial of service on EFACEC QC60/90/120 chargers by exhausting resources on a critical control board. For European organizations, especially those operating EV charging infrastructure, this could lead to widespread charger outages, disrupting EV fleet operations, public charging availability, and potentially causing economic and reputational damage. Critical infrastructure operators and commercial EV fleet managers may face operational delays and increased costs due to charger downtime. The disruption could also undermine confidence in EV infrastructure reliability, slowing EV adoption. Since EFACEC is a major European manufacturer with significant market share in countries like Portugal, Germany, France, and the Netherlands, the impact is geographically concentrated but potentially severe. The lack of authentication or user interaction required for exploitation increases the risk of automated or large-scale attacks. Additionally, the vulnerability could be leveraged as part of a broader attack campaign targeting transportation infrastructure, with potential cascading effects on energy and mobility sectors.
Mitigation Recommendations
1. Implement network-level filtering to detect and block abnormal ARP traffic volumes targeting EFACEC chargers, using intrusion detection/prevention systems (IDS/IPS) with ARP flood detection capabilities. 2. Segment the network to isolate charger management interfaces from general network traffic, reducing exposure to external ARP floods. 3. Employ rate limiting on ARP requests at network switches or routers connected to charging stations to prevent resource exhaustion. 4. Monitor network traffic continuously for unusual ARP request patterns and establish alerting mechanisms for rapid incident response. 5. Coordinate with EFACEC for timely patch releases and apply firmware updates as soon as they become available. 6. Consider deploying dedicated security gateways or firewalls with ARP inspection features in EV charging station networks. 7. Educate operational staff on recognizing symptoms of charger denial of service and establish incident response playbooks specific to this vulnerability. 8. Engage with local CERTs and industry groups to share threat intelligence and mitigation strategies related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- S21sec
- Date Reserved
- 2026-01-07T14:01:04.829Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695e6d507349d0379da4e26d
Added to database: 1/7/2026, 2:27:28 PM
Last enriched: 1/14/2026, 3:57:00 PM
Last updated: 2/7/2026, 11:25:02 AM
Views: 194
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.