Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27772: CWE-306 in EV Energy ev.energy

0
Critical
VulnerabilityCVE-2026-27772cvecve-2026-27772cwe-306
Published: Fri Feb 27 2026 (02/27/2026, 00:09:12 UTC)
Source: CVE Database V5
Vendor/Project: EV Energy
Product: ev.energy

Description

CVE-2026-27772 is a critical vulnerability in EV Energy's ev. energy product where WebSocket endpoints lack authentication, allowing attackers to impersonate charging stations. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier and issue or receive OCPP commands as if they were a legitimate charger. This flaw enables privilege escalation, unauthorized control over charging infrastructure, and corruption of charging network data sent to the backend. The vulnerability affects all versions of ev. energy and has a CVSS score of 9. 4, indicating high impact on confidentiality and integrity with low attack complexity and no user interaction required. No patches are currently available, and no known exploits have been reported in the wild. Organizations using ev. energy charging infrastructure are at significant risk of operational disruption and data manipulation due to this vulnerability.

AI-Powered Analysis

AILast updated: 02/27/2026, 00:26:22 UTC

Technical Analysis

CVE-2026-27772 is a critical security vulnerability identified in the ev.energy product by EV Energy, affecting all versions. The root cause is the absence of proper authentication mechanisms on the WebSocket endpoints that handle Open Charge Point Protocol (OCPP) communications between charging stations and backend systems. Specifically, the WebSocket endpoint allows unauthenticated connections from clients that present a charging station identifier, which can be either known or discovered by an attacker. Once connected, the attacker can impersonate a legitimate charging station, issuing or receiving OCPP commands without restriction. This lack of authentication corresponds to CWE-306 (Missing Authentication for Critical Function). The vulnerability enables attackers to escalate privileges, gain unauthorized control over charging stations, manipulate charging commands, and corrupt data reported to the backend infrastructure. The CVSS v3.1 score of 9.4 reflects the vulnerability's critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity, though availability impact is low. The vulnerability was published on February 27, 2026, with no patches or mitigations currently available, and no known exploits detected in the wild. This flaw poses a significant risk to the security and reliability of EV charging networks relying on ev.energy products.

Potential Impact

The impact of CVE-2026-27772 is substantial for organizations operating EV charging infrastructure using ev.energy products. Unauthorized attackers can impersonate legitimate charging stations, leading to unauthorized control over charging operations. This can result in manipulation of charging sessions, such as starting, stopping, or altering charging parameters, potentially causing financial losses, operational disruptions, or safety hazards. Additionally, attackers can corrupt or falsify data reported to backend systems, undermining the integrity of usage records, billing, and monitoring. The confidentiality of charging station identities and operational data is also compromised, which could facilitate further targeted attacks or espionage. Although availability impact is rated low, the integrity and confidentiality breaches alone can severely damage trust in the charging network and cause regulatory compliance issues. Given the critical role of EV charging infrastructure in energy and transportation sectors, this vulnerability could have cascading effects on energy management and smart grid operations if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2026-27772, organizations should implement strong authentication mechanisms on all WebSocket endpoints handling OCPP communications. This includes enforcing mutual TLS authentication or token-based authentication to verify charging station identities before allowing command exchanges. Network segmentation should be applied to isolate charging station communication channels from public or untrusted networks, reducing exposure to unauthorized access. Monitoring and anomaly detection systems should be deployed to identify unusual connection attempts or command patterns indicative of impersonation attempts. Until official patches or updates are released by EV Energy, organizations should consider disabling remote WebSocket access or restricting it to trusted IP ranges. Additionally, conducting thorough audits of charging station identifiers and rotating them periodically can reduce the risk of identifier discovery. Collaboration with EV Energy for timely patch deployment and sharing threat intelligence related to this vulnerability is essential. Finally, organizations should prepare incident response plans specific to charging infrastructure compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-24T00:16:49.691Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0e11f32ffcdb8a28c26e8

Added to database: 2/27/2026, 12:11:11 AM

Last enriched: 2/27/2026, 12:26:22 AM

Last updated: 2/27/2026, 4:04:07 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses