Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27649: CWE-613 in CTEK Chargeportal

0
High
VulnerabilityCVE-2026-27649cvecve-2026-27649cwe-613
Published: Fri Mar 20 2026 (03/20/2026, 22:46:40 UTC)
Source: CVE Database V5
Vendor/Project: CTEK
Product: Chargeportal

Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:41:58 UTC

Technical Analysis

CVE-2026-27649 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) found in the WebSocket backend of CTEK's Chargeportal, a platform used to manage electric vehicle charging stations. The backend uniquely associates sessions using charging station identifiers; however, it permits multiple endpoints to connect using the same session identifier. This design flaw results in predictable session identifiers and allows session hijacking or shadowing attacks. In such attacks, an adversary can establish a new connection using the same session ID, effectively displacing the legitimate charging station's connection. Consequently, the attacker receives backend commands intended for the legitimate station, potentially allowing unauthorized authentication as another user or device. Additionally, the vulnerability can be exploited to cause denial-of-service (DoS) conditions by overwhelming the backend with numerous valid session requests, disrupting normal operations. The vulnerability affects all versions of Chargeportal, with no patches currently available. The CVSS 3.1 base score is 7.3 (high severity), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits have been reported in the wild to date.

Potential Impact

This vulnerability poses significant risks to organizations operating electric vehicle charging infrastructure using CTEK Chargeportal. Unauthorized session hijacking can lead to attackers impersonating legitimate charging stations, potentially manipulating charging commands, disrupting billing processes, or causing operational confusion. The ability to displace legitimate connections can interrupt service availability, impacting end-users and damaging organizational reputation. The DoS potential could degrade or halt charging station management services, affecting large-scale deployments and critical infrastructure. Confidentiality and integrity of communication between charging stations and backend systems are compromised, increasing the risk of data leakage or malicious command injection. Given the growing adoption of EV infrastructure globally, exploitation could have widespread operational and financial consequences, especially for utilities, fleet operators, and public charging networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Enforce unique and non-predictable session identifiers that cannot be reused or shadowed by multiple endpoints. 2) Implement strict session management policies that invalidate previous sessions upon new connections using the same identifier. 3) Introduce mutual authentication mechanisms between charging stations and backend systems to prevent unauthorized connections. 4) Monitor WebSocket connections for abnormal session reuse or rapid connection attempts indicative of DoS attacks. 5) Apply network-level protections such as rate limiting and IP filtering to reduce the risk of flooding attacks. 6) Coordinate with CTEK for timely patch deployment once available and consider temporary compensating controls such as isolating vulnerable components or restricting access to trusted networks. 7) Conduct regular security assessments and penetration testing focused on session management and WebSocket communication channels.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T16:52:46.523Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda57b462d409683a8c55

Added to database: 3/20/2026, 11:37:59 PM

Last enriched: 3/20/2026, 11:41:58 PM

Last updated: 3/21/2026, 2:52:22 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses