Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22878: CWE-522 in Mobility46 mobility46.se

0
Medium
VulnerabilityCVE-2026-22878cvecve-2026-22878cwe-522
Published: Fri Feb 27 2026 (02/27/2026, 00:25:23 UTC)
Source: CVE Database V5
Vendor/Project: Mobility46
Product: mobility46.se

Description

CVE-2026-22878 is a medium severity vulnerability affecting all versions of Mobility46's mobility46. se platform. The issue involves charging station authentication identifiers being publicly accessible through web-based mapping platforms, classified under CWE-522 (Insufficiently Protected Credentials). This exposure allows unauthorized parties to obtain sensitive authentication data without requiring privileges or user interaction. Although no known exploits are currently reported in the wild, the vulnerability poses risks to confidentiality and integrity of charging station authentication processes. The vulnerability has a CVSS 3. 1 base score of 6. 5, indicating moderate risk. Organizations using Mobility46's platform should prioritize securing access to these identifiers and monitor for potential misuse. Countries with significant electric vehicle infrastructure and Mobility46 market presence are at higher risk.

AI-Powered Analysis

AILast updated: 02/27/2026, 01:13:52 UTC

Technical Analysis

CVE-2026-22878 is a vulnerability identified in the Mobility46 platform (mobility46.se) that affects all versions of the product. The core issue is that charging station authentication identifiers, which are critical for validating and authorizing access to electric vehicle charging stations, are exposed publicly via web-based mapping platforms. This vulnerability is categorized under CWE-522, which refers to insufficient protection of credentials. The exposure occurs without requiring any privileges or user interaction, meaning an attacker can access these identifiers remotely and anonymously. The CVSS 3.1 score of 6.5 reflects a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and impacts on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The public availability of authentication identifiers could allow attackers to impersonate legitimate users or devices, potentially leading to unauthorized use of charging stations or manipulation of charging sessions. Although no exploits have been reported in the wild, the vulnerability presents a tangible risk to the security and trustworthiness of the charging infrastructure managed via Mobility46's platform. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for immediate compensating controls and monitoring.

Potential Impact

The exposure of charging station authentication identifiers can have several impacts on organizations and users worldwide. Confidentiality is compromised as sensitive credentials are publicly accessible, enabling unauthorized parties to gather information that should be protected. Integrity is at risk because attackers could potentially use these identifiers to impersonate legitimate users or devices, leading to unauthorized charging sessions, fraudulent usage, or manipulation of charging data. While availability is not directly impacted, the misuse of credentials could indirectly affect service reliability or billing accuracy. For organizations operating electric vehicle charging infrastructure, this vulnerability could result in financial losses, reputational damage, and erosion of customer trust. Additionally, attackers might leverage exposed identifiers as a foothold for further attacks on the charging network or related systems. The risk is amplified in regions with high adoption of electric vehicles and reliance on Mobility46's platform, where disruption or misuse could have broader economic and operational consequences.

Mitigation Recommendations

To mitigate CVE-2026-22878 effectively, organizations should implement the following specific measures: 1) Restrict public access to charging station authentication identifiers by configuring web-based mapping platforms and associated APIs to require authentication and authorization controls, ensuring only legitimate users can view sensitive data. 2) Employ strong encryption and secure storage for authentication credentials both at rest and in transit to prevent unauthorized disclosure. 3) Implement robust access control policies and role-based access management to limit exposure of sensitive identifiers internally and externally. 4) Monitor network traffic and logs for unusual access patterns or attempts to retrieve authentication identifiers, enabling early detection of potential exploitation attempts. 5) Coordinate with Mobility46 to obtain updates or patches as they become available, and apply them promptly. 6) Conduct regular security assessments and penetration testing focused on credential exposure and access control weaknesses within the charging infrastructure ecosystem. 7) Educate staff and users about the risks associated with credential exposure and enforce best practices for credential management. These targeted actions go beyond generic advice by focusing on access restriction, encryption, monitoring, and collaboration with the vendor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-24T00:35:18.435Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0ebad32ffcdb8a293f2b3

Added to database: 2/27/2026, 12:56:13 AM

Last enriched: 2/27/2026, 1:13:52 AM

Last updated: 2/27/2026, 6:39:24 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses