Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26071: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in EVerest everest-core

0
Medium
VulnerabilityCVE-2026-26071cvecve-2026-26071cwe-362cwe-416
Published: Thu Mar 26 2026 (03/26/2026, 14:48:30 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::string` concurrent access. with heap-use-after-free possible. This is triggered by EVCCID update (EV/ISO15118) and OCPP session/authorization events. Version 2026.02.0 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:27:28 UTC

Technical Analysis

CVE-2026-26071 is a concurrency vulnerability in the everest-core component of the EVerest EV charging software stack. The flaw arises from improper synchronization when accessing a shared std::string resource during concurrent operations triggered by EVCCID updates (related to EV/ISO15118 protocol) and OCPP session or authorization events. This race condition can cause heap-use-after-free scenarios, potentially leading to application crashes or undefined behavior. The vulnerability affects all versions prior to 2026.02.0, which includes the vulnerable code paths where concurrent threads or processes access and modify shared string data without adequate locking or atomic operations. The issue does not expose sensitive data or allow code execution but can disrupt service availability by causing the charging software to crash or behave unpredictably. The CVSS v3.1 score is 4.2, reflecting a medium severity with network attack vector but high attack complexity and no privileges or user interaction required. No known exploits are currently in the wild. The vendor has released a patch in version 2026.02.0 that addresses the synchronization flaw by implementing proper concurrency controls to prevent simultaneous unsafe access to the shared resource.

Potential Impact

The primary impact of this vulnerability is on the availability of EV charging services relying on the EVerest everest-core software. Exploitation can cause crashes or instability due to heap-use-after-free conditions, potentially leading to denial of service. This can disrupt EV charging operations, affecting end users and operators. While confidentiality and integrity are not directly impacted, service interruptions in critical EV infrastructure could have broader operational and reputational consequences. Organizations operating EV charging networks may experience downtime or degraded service quality, impacting customer satisfaction and operational efficiency. The medium CVSS score and high attack complexity reduce the likelihood of widespread exploitation, but the risk remains significant for targeted attacks or misconfigured environments. No known exploits in the wild currently reduce immediate risk but patching is essential to prevent future attacks.

Mitigation Recommendations

Organizations should upgrade EVerest everest-core to version 2026.02.0 or later, which contains the patch fixing the race condition and heap-use-after-free vulnerability. Until upgrading, operators should minimize concurrent triggering of EVCCID updates and OCPP session/authorization events if possible, to reduce the chance of triggering the race condition. Implementing runtime monitoring and logging for application crashes or memory errors can help detect exploitation attempts. Conduct thorough testing of EV charging software under concurrent load to identify and mitigate synchronization issues. Network segmentation and strict access controls should be enforced to limit exposure of the EV charging software to untrusted networks or users, given the high attack complexity and network vector. Regularly review and apply vendor security advisories and patches promptly. Consider deploying application-level watchdogs or failover mechanisms to maintain service continuity in case of crashes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.901Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c57a7d3c064ed76f9f9ceb

Added to database: 3/26/2026, 6:27:09 PM

Last enriched: 3/26/2026, 6:27:28 PM

Last updated: 3/27/2026, 5:25:51 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses