CVE-2026-26071: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in EVerest everest-core
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::string` concurrent access. with heap-use-after-free possible. This is triggered by EVCCID update (EV/ISO15118) and OCPP session/authorization events. Version 2026.02.0 contains a patch.
AI Analysis
Technical Summary
CVE-2026-26071 is a concurrency vulnerability in the everest-core component of the EVerest EV charging software stack. The flaw arises from improper synchronization when accessing a shared std::string resource during concurrent operations triggered by EVCCID updates (related to EV/ISO15118 protocol) and OCPP session or authorization events. This race condition can cause heap-use-after-free scenarios, potentially leading to application crashes or undefined behavior. The vulnerability affects all versions prior to 2026.02.0, which includes the vulnerable code paths where concurrent threads or processes access and modify shared string data without adequate locking or atomic operations. The issue does not expose sensitive data or allow code execution but can disrupt service availability by causing the charging software to crash or behave unpredictably. The CVSS v3.1 score is 4.2, reflecting a medium severity with network attack vector but high attack complexity and no privileges or user interaction required. No known exploits are currently in the wild. The vendor has released a patch in version 2026.02.0 that addresses the synchronization flaw by implementing proper concurrency controls to prevent simultaneous unsafe access to the shared resource.
Potential Impact
The primary impact of this vulnerability is on the availability of EV charging services relying on the EVerest everest-core software. Exploitation can cause crashes or instability due to heap-use-after-free conditions, potentially leading to denial of service. This can disrupt EV charging operations, affecting end users and operators. While confidentiality and integrity are not directly impacted, service interruptions in critical EV infrastructure could have broader operational and reputational consequences. Organizations operating EV charging networks may experience downtime or degraded service quality, impacting customer satisfaction and operational efficiency. The medium CVSS score and high attack complexity reduce the likelihood of widespread exploitation, but the risk remains significant for targeted attacks or misconfigured environments. No known exploits in the wild currently reduce immediate risk but patching is essential to prevent future attacks.
Mitigation Recommendations
Organizations should upgrade EVerest everest-core to version 2026.02.0 or later, which contains the patch fixing the race condition and heap-use-after-free vulnerability. Until upgrading, operators should minimize concurrent triggering of EVCCID updates and OCPP session/authorization events if possible, to reduce the chance of triggering the race condition. Implementing runtime monitoring and logging for application crashes or memory errors can help detect exploitation attempts. Conduct thorough testing of EV charging software under concurrent load to identify and mitigate synchronization issues. Network segmentation and strict access controls should be enforced to limit exposure of the EV charging software to untrusted networks or users, given the high attack complexity and network vector. Regularly review and apply vendor security advisories and patches promptly. Consider deploying application-level watchdogs or failover mechanisms to maintain service continuity in case of crashes.
Affected Countries
United States, Germany, China, Netherlands, United Kingdom, France, Japan, South Korea, Canada, Norway, Sweden
CVE-2026-26071: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in EVerest everest-core
Description
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::string` concurrent access. with heap-use-after-free possible. This is triggered by EVCCID update (EV/ISO15118) and OCPP session/authorization events. Version 2026.02.0 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26071 is a concurrency vulnerability in the everest-core component of the EVerest EV charging software stack. The flaw arises from improper synchronization when accessing a shared std::string resource during concurrent operations triggered by EVCCID updates (related to EV/ISO15118 protocol) and OCPP session or authorization events. This race condition can cause heap-use-after-free scenarios, potentially leading to application crashes or undefined behavior. The vulnerability affects all versions prior to 2026.02.0, which includes the vulnerable code paths where concurrent threads or processes access and modify shared string data without adequate locking or atomic operations. The issue does not expose sensitive data or allow code execution but can disrupt service availability by causing the charging software to crash or behave unpredictably. The CVSS v3.1 score is 4.2, reflecting a medium severity with network attack vector but high attack complexity and no privileges or user interaction required. No known exploits are currently in the wild. The vendor has released a patch in version 2026.02.0 that addresses the synchronization flaw by implementing proper concurrency controls to prevent simultaneous unsafe access to the shared resource.
Potential Impact
The primary impact of this vulnerability is on the availability of EV charging services relying on the EVerest everest-core software. Exploitation can cause crashes or instability due to heap-use-after-free conditions, potentially leading to denial of service. This can disrupt EV charging operations, affecting end users and operators. While confidentiality and integrity are not directly impacted, service interruptions in critical EV infrastructure could have broader operational and reputational consequences. Organizations operating EV charging networks may experience downtime or degraded service quality, impacting customer satisfaction and operational efficiency. The medium CVSS score and high attack complexity reduce the likelihood of widespread exploitation, but the risk remains significant for targeted attacks or misconfigured environments. No known exploits in the wild currently reduce immediate risk but patching is essential to prevent future attacks.
Mitigation Recommendations
Organizations should upgrade EVerest everest-core to version 2026.02.0 or later, which contains the patch fixing the race condition and heap-use-after-free vulnerability. Until upgrading, operators should minimize concurrent triggering of EVCCID updates and OCPP session/authorization events if possible, to reduce the chance of triggering the race condition. Implementing runtime monitoring and logging for application crashes or memory errors can help detect exploitation attempts. Conduct thorough testing of EV charging software under concurrent load to identify and mitigate synchronization issues. Network segmentation and strict access controls should be enforced to limit exposure of the EV charging software to untrusted networks or users, given the high attack complexity and network vector. Regularly review and apply vendor security advisories and patches promptly. Consider deploying application-level watchdogs or failover mechanisms to maintain service continuity in case of crashes.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-10T18:01:31.901Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c57a7d3c064ed76f9f9ceb
Added to database: 3/26/2026, 6:27:09 PM
Last enriched: 3/26/2026, 6:27:28 PM
Last updated: 3/27/2026, 5:25:51 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.