CVE-2026-27772: CWE-306 in EV Energy ev.energy
CVE-2026-27772 is a critical vulnerability in EV Energy's ev. energy product where WebSocket endpoints lack authentication, allowing attackers to impersonate charging stations. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier and issue or receive OCPP commands as if they were a legitimate charger. This flaw enables privilege escalation, unauthorized control over charging infrastructure, and corruption of charging network data sent to the backend. The vulnerability affects all versions of ev. energy and has a CVSS score of 9. 4, indicating high impact on confidentiality and integrity with low attack complexity and no user interaction required. No patches are currently available, and no known exploits have been reported in the wild. Organizations using ev. energy charging infrastructure are at significant risk of operational disruption and data manipulation due to this vulnerability.
AI Analysis
Technical Summary
CVE-2026-27772 is a critical security vulnerability identified in the ev.energy product by EV Energy, affecting all versions. The root cause is the absence of proper authentication mechanisms on the WebSocket endpoints that handle Open Charge Point Protocol (OCPP) communications between charging stations and backend systems. Specifically, the WebSocket endpoint allows unauthenticated connections from clients that present a charging station identifier, which can be either known or discovered by an attacker. Once connected, the attacker can impersonate a legitimate charging station, issuing or receiving OCPP commands without restriction. This lack of authentication corresponds to CWE-306 (Missing Authentication for Critical Function). The vulnerability enables attackers to escalate privileges, gain unauthorized control over charging stations, manipulate charging commands, and corrupt data reported to the backend infrastructure. The CVSS v3.1 score of 9.4 reflects the vulnerability's critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity, though availability impact is low. The vulnerability was published on February 27, 2026, with no patches or mitigations currently available, and no known exploits detected in the wild. This flaw poses a significant risk to the security and reliability of EV charging networks relying on ev.energy products.
Potential Impact
The impact of CVE-2026-27772 is substantial for organizations operating EV charging infrastructure using ev.energy products. Unauthorized attackers can impersonate legitimate charging stations, leading to unauthorized control over charging operations. This can result in manipulation of charging sessions, such as starting, stopping, or altering charging parameters, potentially causing financial losses, operational disruptions, or safety hazards. Additionally, attackers can corrupt or falsify data reported to backend systems, undermining the integrity of usage records, billing, and monitoring. The confidentiality of charging station identities and operational data is also compromised, which could facilitate further targeted attacks or espionage. Although availability impact is rated low, the integrity and confidentiality breaches alone can severely damage trust in the charging network and cause regulatory compliance issues. Given the critical role of EV charging infrastructure in energy and transportation sectors, this vulnerability could have cascading effects on energy management and smart grid operations if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2026-27772, organizations should implement strong authentication mechanisms on all WebSocket endpoints handling OCPP communications. This includes enforcing mutual TLS authentication or token-based authentication to verify charging station identities before allowing command exchanges. Network segmentation should be applied to isolate charging station communication channels from public or untrusted networks, reducing exposure to unauthorized access. Monitoring and anomaly detection systems should be deployed to identify unusual connection attempts or command patterns indicative of impersonation attempts. Until official patches or updates are released by EV Energy, organizations should consider disabling remote WebSocket access or restricting it to trusted IP ranges. Additionally, conducting thorough audits of charging station identifiers and rotating them periodically can reduce the risk of identifier discovery. Collaboration with EV Energy for timely patch deployment and sharing threat intelligence related to this vulnerability is essential. Finally, organizations should prepare incident response plans specific to charging infrastructure compromise scenarios.
Affected Countries
United States, Germany, United Kingdom, Netherlands, France, China, Japan, South Korea, Canada, Australia
CVE-2026-27772: CWE-306 in EV Energy ev.energy
Description
CVE-2026-27772 is a critical vulnerability in EV Energy's ev. energy product where WebSocket endpoints lack authentication, allowing attackers to impersonate charging stations. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier and issue or receive OCPP commands as if they were a legitimate charger. This flaw enables privilege escalation, unauthorized control over charging infrastructure, and corruption of charging network data sent to the backend. The vulnerability affects all versions of ev. energy and has a CVSS score of 9. 4, indicating high impact on confidentiality and integrity with low attack complexity and no user interaction required. No patches are currently available, and no known exploits have been reported in the wild. Organizations using ev. energy charging infrastructure are at significant risk of operational disruption and data manipulation due to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2026-27772 is a critical security vulnerability identified in the ev.energy product by EV Energy, affecting all versions. The root cause is the absence of proper authentication mechanisms on the WebSocket endpoints that handle Open Charge Point Protocol (OCPP) communications between charging stations and backend systems. Specifically, the WebSocket endpoint allows unauthenticated connections from clients that present a charging station identifier, which can be either known or discovered by an attacker. Once connected, the attacker can impersonate a legitimate charging station, issuing or receiving OCPP commands without restriction. This lack of authentication corresponds to CWE-306 (Missing Authentication for Critical Function). The vulnerability enables attackers to escalate privileges, gain unauthorized control over charging stations, manipulate charging commands, and corrupt data reported to the backend infrastructure. The CVSS v3.1 score of 9.4 reflects the vulnerability's critical nature, with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity, though availability impact is low. The vulnerability was published on February 27, 2026, with no patches or mitigations currently available, and no known exploits detected in the wild. This flaw poses a significant risk to the security and reliability of EV charging networks relying on ev.energy products.
Potential Impact
The impact of CVE-2026-27772 is substantial for organizations operating EV charging infrastructure using ev.energy products. Unauthorized attackers can impersonate legitimate charging stations, leading to unauthorized control over charging operations. This can result in manipulation of charging sessions, such as starting, stopping, or altering charging parameters, potentially causing financial losses, operational disruptions, or safety hazards. Additionally, attackers can corrupt or falsify data reported to backend systems, undermining the integrity of usage records, billing, and monitoring. The confidentiality of charging station identities and operational data is also compromised, which could facilitate further targeted attacks or espionage. Although availability impact is rated low, the integrity and confidentiality breaches alone can severely damage trust in the charging network and cause regulatory compliance issues. Given the critical role of EV charging infrastructure in energy and transportation sectors, this vulnerability could have cascading effects on energy management and smart grid operations if exploited at scale.
Mitigation Recommendations
To mitigate CVE-2026-27772, organizations should implement strong authentication mechanisms on all WebSocket endpoints handling OCPP communications. This includes enforcing mutual TLS authentication or token-based authentication to verify charging station identities before allowing command exchanges. Network segmentation should be applied to isolate charging station communication channels from public or untrusted networks, reducing exposure to unauthorized access. Monitoring and anomaly detection systems should be deployed to identify unusual connection attempts or command patterns indicative of impersonation attempts. Until official patches or updates are released by EV Energy, organizations should consider disabling remote WebSocket access or restricting it to trusted IP ranges. Additionally, conducting thorough audits of charging station identifiers and rotating them periodically can reduce the risk of identifier discovery. Collaboration with EV Energy for timely patch deployment and sharing threat intelligence related to this vulnerability is essential. Finally, organizations should prepare incident response plans specific to charging infrastructure compromise scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-02-24T00:16:49.691Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0e11f32ffcdb8a28c26e8
Added to database: 2/27/2026, 12:11:11 AM
Last enriched: 2/27/2026, 12:26:22 AM
Last updated: 2/27/2026, 4:04:07 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3285: Out-of-Bounds Read in berry-lang berry
MediumCVE-2026-3284: Integer Overflow in libvips
MediumCVE-2026-3283: Out-of-Bounds Read in libvips
MediumCVE-2026-3282: Out-of-Bounds Read in libvips
MediumCVE-2026-3281: Heap-based Buffer Overflow in libvips
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.