CVE-2026-26288: CWE-306 in Everon api.everon.io
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
AI Analysis
Technical Summary
CVE-2026-26288 is a critical authentication bypass vulnerability classified under CWE-306, affecting the Everon api.everon.io platform, specifically its OCPP (Open Charge Point Protocol) WebSocket endpoints. These endpoints do not implement any authentication mechanisms, allowing attackers to connect as if they were legitimate charging stations by simply using a known or discovered station identifier. Once connected, attackers can send or receive OCPP commands, effectively impersonating a charging station. This can lead to unauthorized control over charging operations, including starting or stopping charging sessions, manipulating charging parameters, or corrupting data reported to the backend system. The vulnerability impacts all versions of the Everon platform and is remotely exploitable over the network without requiring any privileges or user interaction. The CVSS v3.1 score of 9.4 reflects the high confidentiality and integrity impact, with a low attack complexity and no authentication required. Although no patches or mitigations have been published yet, the flaw poses a severe risk to the integrity and availability of electric vehicle charging infrastructure managed via Everon's platform.
Potential Impact
The vulnerability enables attackers to impersonate legitimate charging stations, leading to unauthorized control over charging infrastructure. This can result in privilege escalation, manipulation of charging sessions, disruption of service availability, and corruption of critical operational data reported to backend systems. Organizations could face operational downtime, financial losses, reputational damage, and potential safety risks if charging stations are manipulated maliciously. The integrity of billing and usage data may also be compromised, affecting revenue and regulatory compliance. Given the increasing reliance on electric vehicle infrastructure, this vulnerability could have widespread implications for utilities, charging network operators, and end users globally.
Mitigation Recommendations
Organizations should immediately implement network-level access controls to restrict connections to the OCPP WebSocket endpoints to trusted sources only. Employ VPNs or private networks to isolate charging station communications from public internet access. Monitor network traffic for anomalous connections or commands that do not correspond to known station identifiers or expected behavior. Implement application-layer authentication proxies or gateways that enforce authentication before allowing WebSocket connections to the backend. Coordinate with Everon for timely patches or updates once available and plan for rapid deployment. Additionally, maintain an inventory of charging station identifiers and monitor for unauthorized use. Consider deploying anomaly detection systems to identify unusual command patterns indicative of impersonation attempts.
Affected Countries
United States, Germany, Netherlands, United Kingdom, France, China, Japan, South Korea, Canada, Australia
CVE-2026-26288: CWE-306 in Everon api.everon.io
Description
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-26288 is a critical authentication bypass vulnerability classified under CWE-306, affecting the Everon api.everon.io platform, specifically its OCPP (Open Charge Point Protocol) WebSocket endpoints. These endpoints do not implement any authentication mechanisms, allowing attackers to connect as if they were legitimate charging stations by simply using a known or discovered station identifier. Once connected, attackers can send or receive OCPP commands, effectively impersonating a charging station. This can lead to unauthorized control over charging operations, including starting or stopping charging sessions, manipulating charging parameters, or corrupting data reported to the backend system. The vulnerability impacts all versions of the Everon platform and is remotely exploitable over the network without requiring any privileges or user interaction. The CVSS v3.1 score of 9.4 reflects the high confidentiality and integrity impact, with a low attack complexity and no authentication required. Although no patches or mitigations have been published yet, the flaw poses a severe risk to the integrity and availability of electric vehicle charging infrastructure managed via Everon's platform.
Potential Impact
The vulnerability enables attackers to impersonate legitimate charging stations, leading to unauthorized control over charging infrastructure. This can result in privilege escalation, manipulation of charging sessions, disruption of service availability, and corruption of critical operational data reported to backend systems. Organizations could face operational downtime, financial losses, reputational damage, and potential safety risks if charging stations are manipulated maliciously. The integrity of billing and usage data may also be compromised, affecting revenue and regulatory compliance. Given the increasing reliance on electric vehicle infrastructure, this vulnerability could have widespread implications for utilities, charging network operators, and end users globally.
Mitigation Recommendations
Organizations should immediately implement network-level access controls to restrict connections to the OCPP WebSocket endpoints to trusted sources only. Employ VPNs or private networks to isolate charging station communications from public internet access. Monitor network traffic for anomalous connections or commands that do not correspond to known station identifiers or expected behavior. Implement application-layer authentication proxies or gateways that enforce authentication before allowing WebSocket connections to the backend. Coordinate with Everon for timely patches or updates once available and plan for rapid deployment. Additionally, maintain an inventory of charging station identifiers and monitor for unauthorized use. Consider deploying anomaly detection systems to identify unusual command patterns indicative of impersonation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-02-25T15:28:27.119Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69aaf339c48b3f10ffa20e25
Added to database: 3/6/2026, 3:31:05 PM
Last enriched: 3/13/2026, 7:24:46 PM
Last updated: 4/21/2026, 2:54:33 AM
Views: 152
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.