Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22541: CWE-400 Uncontrolled Resource Consumption in EFACEC QC 60/90/120

0
High
VulnerabilityCVE-2026-22541cvecve-2026-22541cwe-400
Published: Wed Jan 07 2026 (01/07/2026, 15:12:42 UTC)
Source: CVE Database V5
Vendor/Project: EFACEC
Product: QC 60/90/120

Description

The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.

AI-Powered Analysis

AILast updated: 01/07/2026, 15:41:52 UTC

Technical Analysis

CVE-2026-22541 is classified under CWE-400, indicating an uncontrolled resource consumption vulnerability in EFACEC QC 60/90/120 electric vehicle (EV) charger boards, specifically version 8. The vulnerability arises from the device's handling of ICMP requests; an attacker can send a massive volume of ICMP packets to the affected board, overwhelming its processing capacity. This results in a denial of service (DoS) condition on the board responsible for controlling the EV interfaces. Since this board is critical for the correct operation of the charger, its failure causes the entire charging station to become non-functional. The CVSS 4.0 base score is 8.2 (high severity), reflecting the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H). The vulnerability does not affect confidentiality or integrity but severely impacts availability. No known exploits have been reported in the wild yet, but the potential for disruption is significant given the critical infrastructure role of EV chargers. The vulnerability is published and assigned by S21sec, but no patches are currently linked, indicating that remediation may still be pending or in development.

Potential Impact

For European organizations, the impact of CVE-2026-22541 is primarily operational, affecting the availability of EV charging infrastructure. Disruption of EV chargers can lead to significant inconvenience for EV users, potential loss of revenue for charging station operators, and reputational damage. In critical infrastructure contexts, such as public transportation hubs, commercial fleets, or municipal EV charging networks, prolonged outages could hinder transportation logistics and energy management. Given the increasing adoption of electric vehicles across Europe and the strategic push for sustainable transportation, any disruption in EV charging availability poses a risk to broader environmental and economic goals. Additionally, attackers could leverage this vulnerability to cause targeted denial of service attacks during peak usage times or coordinated campaigns against energy infrastructure. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat landscape. Organizations relying on EFACEC QC 60/90/120 chargers must consider the operational risks and potential cascading effects on EV ecosystem services.

Mitigation Recommendations

Immediate mitigation should focus on network-level defenses to prevent or limit ICMP flood attacks targeting the affected boards. This includes implementing rate limiting and filtering of ICMP traffic at firewalls and network edge devices to reduce the volume of ICMP packets reaching the chargers. Network segmentation can isolate EV charging infrastructure from general-purpose networks, minimizing exposure. Monitoring network traffic for unusual ICMP patterns and setting up alerts can provide early detection of attempted exploitation. Organizations should engage with EFACEC for official patches or firmware updates addressing this vulnerability and plan timely deployment once available. Additionally, incorporating redundancy in EV charging infrastructure can reduce the impact of individual charger outages. Incident response plans should include procedures for rapid identification and mitigation of DoS conditions affecting EV chargers. Finally, collaboration with energy and transportation sector cybersecurity groups can facilitate information sharing and coordinated defense strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2026-01-07T14:01:04.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695e7b617349d0379da93610

Added to database: 1/7/2026, 3:27:29 PM

Last enriched: 1/7/2026, 3:41:52 PM

Last updated: 1/8/2026, 6:46:14 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats