Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27767: CWE-306 Missing Authentication for Critical Function in SWITCH EV swtchenergy.com

0
Critical
VulnerabilityCVE-2026-27767cvecve-2026-27767cwe-306
Published: Thu Feb 26 2026 (02/26/2026, 23:57:51 UTC)
Source: CVE Database V5
Vendor/Project: SWITCH EV
Product: swtchenergy.com

Description

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 20:53:53 UTC

Technical Analysis

CVE-2026-27767 identifies a critical security flaw in SWITCH EV's charging station management system accessible via swtchenergy.com. The vulnerability arises from missing authentication controls on WebSocket endpoints that handle OCPP communications between charging stations and backend systems. Attackers can exploit this by connecting to the OCPP WebSocket endpoint using a legitimate or discovered charging station identifier without any authentication. This allows them to impersonate a charging station, issuing commands or intercepting data intended for the backend. The lack of authentication constitutes a CWE-306 weakness, enabling unauthorized privilege escalation and control over charging infrastructure. The vulnerability impacts all versions of the product and is remotely exploitable over the network without any user interaction or privileges. The CVSS 3.1 score of 9.4 reflects the high confidentiality and integrity impact, with a low attack complexity and no required privileges. This flaw could lead to unauthorized manipulation of charging sessions, disruption of electric vehicle charging services, and corruption of operational data, potentially affecting grid management and billing systems. No patches or mitigations are currently listed, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

The vulnerability poses a severe risk to organizations operating SWITCH EV charging infrastructure worldwide. Unauthorized attackers can impersonate legitimate charging stations, leading to unauthorized control over charging processes, manipulation of charging data, and potential disruption of electric vehicle charging services. This can result in financial losses due to incorrect billing or service denial, damage to operational integrity, and erosion of customer trust. Additionally, compromised charging infrastructure could be leveraged as a foothold for further attacks on critical energy infrastructure or grid management systems. The confidentiality of operational data is at risk, as attackers can intercept or alter communications. The integrity of charging sessions and backend data is compromised, potentially causing cascading effects on energy distribution and management. Although availability impact is rated low, targeted attacks could still disrupt services temporarily. The broad impact scope and ease of exploitation make this a critical threat for energy providers, charging network operators, and related stakeholders.

Mitigation Recommendations

To mitigate CVE-2026-27767, organizations should immediately implement strong authentication mechanisms on all WebSocket endpoints handling OCPP communications. This includes enforcing mutual TLS authentication or token-based authentication to verify the identity of charging stations before allowing command exchange. Network segmentation should be applied to isolate charging infrastructure from other critical systems, limiting exposure. Monitoring and logging of WebSocket connections and OCPP commands should be enhanced to detect anomalous or unauthorized activity promptly. Organizations should conduct thorough audits of charging station identifiers and revoke or rotate any that may be compromised or publicly known. Where possible, implement rate limiting and anomaly detection on WebSocket endpoints to prevent abuse. Vendors should be engaged to develop and deploy patches or firmware updates that address the authentication deficiency. Until patches are available, consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with custom rules to block unauthorized WebSocket connections. Finally, educate operational teams on the risks and signs of exploitation to improve incident response readiness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-23T23:48:14.385Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0e11f32ffcdb8a28c26e3

Added to database: 2/27/2026, 12:11:11 AM

Last enriched: 3/6/2026, 8:53:53 PM

Last updated: 4/12/2026, 11:33:54 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses