Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26073: CWE-122: Heap-based Buffer Overflow in EVerest everest-core

0
Medium
VulnerabilityCVE-2026-26073cvecve-2026-26073cwe-122
Published: Thu Mar 26 2026 (03/26/2026, 16:15:22 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to possible `std::queue`/`std::deque` corruption. The trigger is powermeter public key update and EV session/error events (while OCPP not started). This results in a TSAN data race report and an ASAN/UBSAN misaligned address runtime error being observed. Version 2026.02.0 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 17:03:40 UTC

Technical Analysis

CVE-2026-26073 is a heap-based buffer overflow vulnerability classified under CWE-122 found in the everest-core component of the EVerest EV charging software stack. The vulnerability exists in versions prior to 2026.02.0 and is caused by a data race condition that leads to corruption of standard C++ container classes std::queue or std::deque. The race condition is triggered when the system processes powermeter public key updates concurrently with EV session or error events while the Open Charge Point Protocol (OCPP) is not active. This concurrency issue results in memory corruption, which is detected by runtime sanitizers such as TSAN, ASAN, and UBSAN, indicating misaligned addresses and undefined behavior. The heap overflow can cause application instability or crashes, impacting availability. The vulnerability does not require authentication or user interaction but has a high attack complexity, as the attacker must time events precisely to trigger the race. No known exploits have been reported in the wild to date. The vendor addressed the issue in version 2026.02.0 by patching the concurrency handling to eliminate the data race and prevent container corruption.

Potential Impact

This vulnerability primarily threatens the availability of EV charging software systems running affected versions of everest-core. Exploitation can lead to application crashes or denial of service, disrupting EV charging operations. For organizations operating EV charging infrastructure, this can result in service outages, customer dissatisfaction, and potential revenue loss. While confidentiality and integrity impacts are not evident, the disruption of critical EV charging services can have cascading effects on transportation and energy sectors. Given the increasing reliance on EV infrastructure worldwide, widespread exploitation could affect large-scale charging networks, especially those that have not updated to the patched version. The medium CVSS score reflects the moderate risk due to the complexity of exploitation and lack of direct data compromise, but the operational impact remains significant.

Mitigation Recommendations

Organizations should immediately upgrade everest-core to version 2026.02.0 or later to apply the official patch that resolves the data race condition. In addition, developers and operators should implement strict concurrency controls and thread synchronization mechanisms around shared data structures like std::queue and std::deque to prevent race conditions. Employing static and dynamic analysis tools such as TSAN, ASAN, and UBSAN during development and testing can help detect similar concurrency issues early. Network segmentation and limiting exposure of EV charging management interfaces can reduce the attack surface. Monitoring logs for unusual powermeter public key updates or EV session events occurring out of expected sequences may help detect attempted exploitation. Finally, maintaining an incident response plan tailored to EV infrastructure disruptions will improve resilience against potential denial of service attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-10T18:01:31.901Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c562cdf4197a8e3be49a75

Added to database: 3/26/2026, 4:46:05 PM

Last enriched: 3/26/2026, 5:03:40 PM

Last updated: 3/26/2026, 8:27:03 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses