Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24003: CWE-287: Improper Authentication in EVerest everest-core

0
Medium
VulnerabilityCVE-2026-24003cvecve-2026-24003cwe-287cwe-863
Published: Mon Jan 26 2026 (01/26/2026, 22:12:47 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

CVE-2026-24003 is a medium-severity improper authentication vulnerability in the EVerest everest-core EV charging software stack versions up to 2025. 12. 1. The flaw allows an attacker to bypass sequence state verification and authentication checks via ISO 15118-2 messages published to the MQTT server, enabling transitions to forbidden states and illegitimate context updates. Although the internal state machine prevents leaving the WaitingForAuthentication state without proper authentication, crafted messages can trick the system into preparing to charge and send current. However, the final step of closing contactors to actually deliver current appears not possible without proper state transition. No patches are available at the time of publication, and no known exploits exist in the wild. The vulnerability impacts the integrity of the charging process but does not affect confidentiality or availability. European organizations operating EV charging infrastructure using EVerest software are at risk, especially in countries with high EV adoption and infrastructure deployment. Mitigation involves strict network segmentation, monitoring MQTT traffic for anomalous ISO 15118-2 messages, and applying vendor updates once available.

AI-Powered Analysis

AILast updated: 02/03/2026, 08:36:56 UTC

Technical Analysis

CVE-2026-24003 is an improper authentication vulnerability (CWE-287) in the everest-core component of the EVerest EV charging software stack, affecting versions up to and including 2025.12.1. The vulnerability arises from the ability to bypass sequence state verification and authentication mechanisms within the EVSEManager Charger internal state machine. Normally, authorization is handled by a separate module, and the state machine prevents transitioning out of the WaitingForAuthentication state via ISO 15118-2 communication, which is a protocol standard for EV charging communication. However, due to the modular design and the way ISO 15118-2 messages are published to the MQTT server, an attacker can send crafted messages that cause the system to prepare for charging and even prepare to send current without proper authentication. This means the internal context can be updated with illegitimate data, potentially leading to unauthorized charging operations. The final step to actually send current requires closing contactors, which the attacker cannot trigger without leaving the WaitingForAuthentication state, thus limiting the exploitability. No patches or fixed versions are available at the time of disclosure, and no known exploits have been reported in the wild. The CVSS v3.1 score is 4.3 (medium), reflecting the limited impact on integrity without affecting confidentiality or availability, and the requirement for network access but no privileges or user interaction.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity of EV charging operations, potentially allowing unauthorized manipulation of charging states and preparation to deliver current. While the inability to close contactors without proper authentication limits the risk of actual unauthorized power delivery, attackers could still disrupt charging workflows or cause billing inaccuracies. This could undermine trust in EV infrastructure, lead to financial losses, and complicate operational management. Given the increasing adoption of electric vehicles and expansion of charging infrastructure across Europe, especially in countries with aggressive EV policies, the vulnerability could affect charging station operators, utilities, and service providers. Additionally, attackers exploiting this flaw might use it as a foothold for further attacks on connected infrastructure, especially where MQTT servers are exposed or insufficiently secured. The lack of patches increases exposure time, necessitating immediate compensating controls.

Mitigation Recommendations

European organizations should implement strict network segmentation to isolate EV charging infrastructure and MQTT servers from untrusted networks, minimizing exposure to remote attackers. Deploy deep packet inspection and anomaly detection on MQTT traffic to identify and block malformed or unauthorized ISO 15118-2 messages that attempt to bypass authentication. Enforce strong access controls and authentication on MQTT brokers to prevent unauthorized publishing of messages. Monitor logs and charging state transitions for unusual patterns indicative of attempted exploitation. Collaborate with EVerest vendors to prioritize patch development and apply updates promptly once available. Consider deploying additional application-layer authentication or message integrity verification mechanisms at the MQTT communication layer to supplement the existing authorization module. Finally, conduct regular security assessments of EV charging infrastructure and related communication protocols to identify and remediate emerging threats.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-19T18:49:20.659Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6977e8c84623b1157cbefcb4

Added to database: 1/26/2026, 10:20:56 PM

Last enriched: 2/3/2026, 8:36:56 AM

Last updated: 2/7/2026, 6:13:15 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats