CVE-2026-24003: CWE-287: Improper Authentication in EVerest everest-core
CVE-2026-24003 is a medium-severity improper authentication vulnerability in the EVerest everest-core EV charging software stack versions up to 2025. 12. 1. The flaw allows an attacker to bypass sequence state verification and authentication checks via ISO 15118-2 messages published to the MQTT server, enabling unauthorized transitions to forbidden states in the EVSEManager Charger internal state machine. Although the attacker can trick the system into preparing to charge and send current, the final step of closing contactors to actually deliver current is not achievable without leaving the WaitingForAuthentication state, which remains protected. No patches are available at the time of publication, and no known exploits exist in the wild. The vulnerability impacts the integrity of the charging process but does not affect confidentiality or availability. European organizations deploying EVerest-based EV charging infrastructure should be aware of this risk and implement compensating controls until a fix is released.
AI Analysis
Technical Summary
CVE-2026-24003 identifies an improper authentication vulnerability (CWE-287) combined with a state machine logic flaw (CWE-863) in the everest-core component of the EVerest EV charging software stack. EVerest manages EV charging sessions using a modular design where authorization is handled separately from the EVSEManager Charger internal state machine. In affected versions (up to and including 2025.12.1), the internal state machine enforces a WaitingForAuthentication state that should prevent unauthorized state transitions during ISO 15118-2 communication. However, due to insufficient sequence state verification, an attacker can send crafted ISO 15118-2 messages via the MQTT server to bypass authentication checks and force the state machine to transition to forbidden states. This manipulation allows the system to prepare for charging and even prepare to send current to the electric vehicle. Despite this, the final physical action of closing contactors to deliver current cannot be performed without proper authentication and state transition, limiting the attack's impact. The vulnerability does not compromise confidentiality or availability but undermines the integrity of the charging session state, potentially leading to unauthorized charging preparations. No patches or fixed versions are available at the time of disclosure, and no active exploitation has been reported.
Potential Impact
For European organizations operating EV charging infrastructure using EVerest everest-core, this vulnerability poses a risk to the integrity of charging session management. An attacker with network access to the MQTT server could manipulate charging states, potentially causing unauthorized charging preparations. While the inability to close contactors prevents actual unauthorized power delivery, the state manipulation could disrupt normal operations, cause billing inaccuracies, or enable further attacks if combined with other vulnerabilities. Given the increasing deployment of EV infrastructure across Europe, especially in countries aggressively promoting EV adoption, this vulnerability could affect critical transportation and energy sectors. The impact is primarily on operational integrity and trustworthiness of charging sessions rather than on data confidentiality or system availability.
Mitigation Recommendations
Until a vendor patch is released, European operators should implement network segmentation and strict access controls to limit exposure of the MQTT server and ISO 15118-2 communication channels. Monitoring and anomaly detection should be enhanced to identify unusual state transitions or unauthorized ISO 15118-2 messages. Employing message authentication and encryption at the MQTT layer can reduce the risk of message spoofing. Operators should also review and harden the configuration of the EVSEManager and related modules to enforce stricter state validation. Collaboration with EVerest developers to obtain early patches or workarounds is recommended. Finally, physical safeguards ensuring that contactors cannot close without proper authentication should be verified and reinforced to prevent unauthorized current delivery.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom
CVE-2026-24003: CWE-287: Improper Authentication in EVerest everest-core
Description
CVE-2026-24003 is a medium-severity improper authentication vulnerability in the EVerest everest-core EV charging software stack versions up to 2025. 12. 1. The flaw allows an attacker to bypass sequence state verification and authentication checks via ISO 15118-2 messages published to the MQTT server, enabling unauthorized transitions to forbidden states in the EVSEManager Charger internal state machine. Although the attacker can trick the system into preparing to charge and send current, the final step of closing contactors to actually deliver current is not achievable without leaving the WaitingForAuthentication state, which remains protected. No patches are available at the time of publication, and no known exploits exist in the wild. The vulnerability impacts the integrity of the charging process but does not affect confidentiality or availability. European organizations deploying EVerest-based EV charging infrastructure should be aware of this risk and implement compensating controls until a fix is released.
AI-Powered Analysis
Technical Analysis
CVE-2026-24003 identifies an improper authentication vulnerability (CWE-287) combined with a state machine logic flaw (CWE-863) in the everest-core component of the EVerest EV charging software stack. EVerest manages EV charging sessions using a modular design where authorization is handled separately from the EVSEManager Charger internal state machine. In affected versions (up to and including 2025.12.1), the internal state machine enforces a WaitingForAuthentication state that should prevent unauthorized state transitions during ISO 15118-2 communication. However, due to insufficient sequence state verification, an attacker can send crafted ISO 15118-2 messages via the MQTT server to bypass authentication checks and force the state machine to transition to forbidden states. This manipulation allows the system to prepare for charging and even prepare to send current to the electric vehicle. Despite this, the final physical action of closing contactors to deliver current cannot be performed without proper authentication and state transition, limiting the attack's impact. The vulnerability does not compromise confidentiality or availability but undermines the integrity of the charging session state, potentially leading to unauthorized charging preparations. No patches or fixed versions are available at the time of disclosure, and no active exploitation has been reported.
Potential Impact
For European organizations operating EV charging infrastructure using EVerest everest-core, this vulnerability poses a risk to the integrity of charging session management. An attacker with network access to the MQTT server could manipulate charging states, potentially causing unauthorized charging preparations. While the inability to close contactors prevents actual unauthorized power delivery, the state manipulation could disrupt normal operations, cause billing inaccuracies, or enable further attacks if combined with other vulnerabilities. Given the increasing deployment of EV infrastructure across Europe, especially in countries aggressively promoting EV adoption, this vulnerability could affect critical transportation and energy sectors. The impact is primarily on operational integrity and trustworthiness of charging sessions rather than on data confidentiality or system availability.
Mitigation Recommendations
Until a vendor patch is released, European operators should implement network segmentation and strict access controls to limit exposure of the MQTT server and ISO 15118-2 communication channels. Monitoring and anomaly detection should be enhanced to identify unusual state transitions or unauthorized ISO 15118-2 messages. Employing message authentication and encryption at the MQTT layer can reduce the risk of message spoofing. Operators should also review and harden the configuration of the EVSEManager and related modules to enforce stricter state validation. Collaboration with EVerest developers to obtain early patches or workarounds is recommended. Finally, physical safeguards ensuring that contactors cannot close without proper authentication should be verified and reinforced to prevent unauthorized current delivery.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T18:49:20.659Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6977e8c84623b1157cbefcb4
Added to database: 1/26/2026, 10:20:56 PM
Last enriched: 1/26/2026, 10:35:17 PM
Last updated: 1/27/2026, 1:12:13 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24686: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in theupdateframework go-tuf
MediumCVE-2026-24490: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MobSF Mobile-Security-Framework-MobSF
HighCVE-2026-24489: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in HappyHackingSpace gakido
MediumCVE-2026-24486: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Kludex python-multipart
HighCVE-2026-24479: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zhblue hustoj
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.