Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27027: CWE-522 in Everon api.everon.io

0
Medium
VulnerabilityCVE-2026-27027cvecve-2026-27027cwe-522
Published: Fri Mar 06 2026 (03/06/2026, 15:20:25 UTC)
Source: CVE Database V5
Vendor/Project: Everon
Product: api.everon.io

Description

Charging station authentication identifiers are publicly accessible via web-based mapping platforms.

AI-Powered Analysis

AILast updated: 03/06/2026, 15:46:46 UTC

Technical Analysis

CVE-2026-27027 identifies a security vulnerability in the Everon api.everon.io platform, which is used to manage electric vehicle charging stations. The core issue is that authentication identifiers for charging stations are exposed publicly via web-based mapping platforms, violating secure credential handling practices as defined by CWE-522 (Insufficiently Protected Credentials). This exposure means that anyone with internet access can retrieve sensitive authentication tokens or identifiers without authentication or user interaction. The vulnerability affects all versions of the Everon API, indicating a systemic design or configuration flaw. The CVSS 3.1 score of 6.5 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). While no exploits have been reported in the wild, the exposure of authentication credentials could allow attackers to impersonate legitimate charging stations or manipulate charging sessions, potentially leading to unauthorized usage, data leakage, or disruption of services. The vulnerability highlights the importance of securing API endpoints and ensuring that sensitive credentials are not inadvertently exposed through public interfaces or third-party platforms. The lack of available patches suggests that mitigation must currently rely on configuration changes and access control improvements.

Potential Impact

The primary impact of this vulnerability is the potential unauthorized access to electric vehicle charging stations managed via the Everon API. Attackers obtaining authentication identifiers could impersonate legitimate devices or users, leading to unauthorized charging sessions, fraudulent billing, or manipulation of charging parameters. This compromises the confidentiality and integrity of the charging infrastructure. While availability is not directly affected, indirect impacts such as service disruptions or reputational damage could occur if attackers misuse the exposed credentials. Organizations operating EV charging networks may face financial losses, regulatory scrutiny, and erosion of customer trust. The vulnerability also poses risks to critical infrastructure sectors reliant on EV charging, including transportation and energy. Given the global push for electric vehicle adoption, the scope of affected systems is broad, potentially impacting numerous operators worldwide. The ease of exploitation—requiring no privileges or user interaction—further elevates the threat level. However, the medium CVSS score reflects that the impact on confidentiality and integrity is limited to low levels, possibly due to additional controls or limited privileges granted by the exposed identifiers.

Mitigation Recommendations

To mitigate CVE-2026-27027, organizations should immediately audit their use of the Everon API and identify any exposure of authentication identifiers on public or third-party web-based mapping platforms. Access to such sensitive data must be restricted using network-level controls such as IP whitelisting, VPNs, or firewall rules to prevent unauthorized external access. Implement strong authentication and authorization mechanisms on the API endpoints to ensure that only legitimate users and devices can retrieve or use authentication credentials. Employ encryption for all sensitive data in transit and at rest to reduce the risk of interception or leakage. Regularly monitor API logs and network traffic for anomalous access patterns indicative of credential harvesting or misuse. Engage with Everon to obtain updates or patches once available and apply them promptly. Consider deploying additional security layers such as API gateways with rate limiting and anomaly detection. Finally, educate staff and partners about the risks of exposing credentials and enforce strict operational security policies regarding credential management and sharing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-25T15:28:27.146Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69aaf339c48b3f10ffa20e29

Added to database: 3/6/2026, 3:31:05 PM

Last enriched: 3/6/2026, 3:46:46 PM

Last updated: 3/7/2026, 8:13:15 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses