CVE-2026-27814: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in EVerest everest-core
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race (C++ UB) triggered by an A 1-phase ↔ 3-phase switch request (`ac_switch_three_phases_while_charging`) during charging/waiting executes concurrently with the state machine loop. Version 2026.02.0 contains a patch.
AI Analysis
Technical Summary
CVE-2026-27814 identifies a concurrency vulnerability classified as CWE-362 (Race Condition) in the EVerest everest-core software, an EV charging stack widely used to manage electric vehicle charging sessions. The flaw exists in versions prior to 2026.02.0 and is triggered when a request to switch charging modes from 1-phase to 3-phase (`ac_switch_three_phases_while_charging`) executes concurrently with the internal state machine loop responsible for managing charging states. This concurrent execution leads to a data race condition in C++ code, causing undefined behavior (UB) such as memory corruption or inconsistent state. The root cause is improper synchronization of shared resources accessed by multiple threads or processes without adequate locking or atomic operations. The vulnerability can result in integrity loss by corrupting charging session data or availability issues by causing crashes or hangs in the charging software. The CVSS v3.1 base score is 4.2, reflecting medium severity due to the requirement of network access with high attack complexity, no privileges, and no user interaction. The scope is unchanged, and confidentiality is not impacted. The vendor released version 2026.02.0 containing a patch that properly synchronizes access to shared resources, eliminating the race condition. No public exploits or active attacks have been reported to date. This vulnerability is particularly relevant to organizations operating EV charging infrastructure using EVerest software, as it could disrupt charging operations or cause denial of service conditions.
Potential Impact
The primary impact of CVE-2026-27814 is on the integrity and availability of EV charging systems running affected versions of EVerest everest-core. Exploitation can lead to corrupted charging session data or inconsistent state transitions, potentially causing incorrect charging behavior or failures. This may result in denial of service for EV users, operational disruptions for charging station operators, and potential safety concerns if charging states are improperly managed. While confidentiality is not affected, the reliability and trustworthiness of EV charging infrastructure could be undermined. Organizations relying on this software for critical EV charging services may face customer dissatisfaction, reputational damage, and operational costs associated with downtime or manual intervention. The medium CVSS score reflects that exploitation requires network access and is complex, limiting widespread exploitation but still posing a tangible risk to targeted infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-27814, organizations should immediately upgrade EVerest everest-core to version 2026.02.0 or later, which contains the official patch addressing the race condition. In environments where immediate upgrade is not feasible, implement strict concurrency controls such as mutexes or locks around the shared resources involved in charging mode switching and state machine operations to prevent concurrent execution. Conduct thorough code reviews and dynamic testing focusing on multi-threaded interactions within the charging software to detect similar synchronization issues. Monitor network traffic to EV charging stations for anomalous or repeated charging mode switch requests that could trigger the race condition. Employ network segmentation and access controls to restrict access to charging management interfaces, reducing the attack surface. Maintain up-to-date backups and incident response plans to quickly recover from potential disruptions. Collaborate with the vendor for any additional recommended security updates or mitigations.
Affected Countries
United States, Germany, China, Netherlands, France, United Kingdom, Japan, South Korea, Canada, Norway
CVE-2026-27814: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in EVerest everest-core
Description
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race (C++ UB) triggered by an A 1-phase ↔ 3-phase switch request (`ac_switch_three_phases_while_charging`) during charging/waiting executes concurrently with the state machine loop. Version 2026.02.0 contains a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27814 identifies a concurrency vulnerability classified as CWE-362 (Race Condition) in the EVerest everest-core software, an EV charging stack widely used to manage electric vehicle charging sessions. The flaw exists in versions prior to 2026.02.0 and is triggered when a request to switch charging modes from 1-phase to 3-phase (`ac_switch_three_phases_while_charging`) executes concurrently with the internal state machine loop responsible for managing charging states. This concurrent execution leads to a data race condition in C++ code, causing undefined behavior (UB) such as memory corruption or inconsistent state. The root cause is improper synchronization of shared resources accessed by multiple threads or processes without adequate locking or atomic operations. The vulnerability can result in integrity loss by corrupting charging session data or availability issues by causing crashes or hangs in the charging software. The CVSS v3.1 base score is 4.2, reflecting medium severity due to the requirement of network access with high attack complexity, no privileges, and no user interaction. The scope is unchanged, and confidentiality is not impacted. The vendor released version 2026.02.0 containing a patch that properly synchronizes access to shared resources, eliminating the race condition. No public exploits or active attacks have been reported to date. This vulnerability is particularly relevant to organizations operating EV charging infrastructure using EVerest software, as it could disrupt charging operations or cause denial of service conditions.
Potential Impact
The primary impact of CVE-2026-27814 is on the integrity and availability of EV charging systems running affected versions of EVerest everest-core. Exploitation can lead to corrupted charging session data or inconsistent state transitions, potentially causing incorrect charging behavior or failures. This may result in denial of service for EV users, operational disruptions for charging station operators, and potential safety concerns if charging states are improperly managed. While confidentiality is not affected, the reliability and trustworthiness of EV charging infrastructure could be undermined. Organizations relying on this software for critical EV charging services may face customer dissatisfaction, reputational damage, and operational costs associated with downtime or manual intervention. The medium CVSS score reflects that exploitation requires network access and is complex, limiting widespread exploitation but still posing a tangible risk to targeted infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-27814, organizations should immediately upgrade EVerest everest-core to version 2026.02.0 or later, which contains the official patch addressing the race condition. In environments where immediate upgrade is not feasible, implement strict concurrency controls such as mutexes or locks around the shared resources involved in charging mode switching and state machine operations to prevent concurrent execution. Conduct thorough code reviews and dynamic testing focusing on multi-threaded interactions within the charging software to detect similar synchronization issues. Monitor network traffic to EV charging stations for anomalous or repeated charging mode switch requests that could trigger the race condition. Employ network segmentation and access controls to restrict access to charging management interfaces, reducing the attack surface. Maintain up-to-date backups and incident response plans to quickly recover from potential disruptions. Collaborate with the vendor for any additional recommended security updates or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:31:33.268Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c562cdf4197a8e3be49a7e
Added to database: 3/26/2026, 4:46:05 PM
Last enriched: 3/26/2026, 5:02:58 PM
Last updated: 3/26/2026, 9:43:18 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.