Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27828: CWE-416: Use After Free in EVerest everest-core

0
Medium
VulnerabilityCVE-2026-27828cvecve-2026-27828cwe-416
Published: Thu Mar 26 2026 (03/26/2026, 16:34:23 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2g_ctx after it has been freed when ISO15118 initialization fails (e.g., no IPv6 link-local address). The EVSE process can be crashed remotely by an attacker with MQTT access who issues a session_setup command while v2g_ctx has been released. Version 2026.02.0 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 17:02:16 UTC

Technical Analysis

CVE-2026-27828 is a use-after-free vulnerability classified under CWE-416 found in the EVerest everest-core software stack, which is used for EV charging infrastructure. The vulnerability arises in the ISO15118_chargerImpl::handle_session_setup function. Specifically, when the ISO15118 initialization fails—commonly due to the absence of an IPv6 link-local address—the v2g_ctx context pointer is freed but subsequently accessed, leading to undefined behavior. This use-after-free condition can be triggered remotely by an attacker who has access to the MQTT interface used by the EVSE (Electric Vehicle Supply Equipment) process. By issuing a crafted session_setup command while the v2g_ctx has been released, the attacker can cause the EVSE process to crash, resulting in a denial of service. The vulnerability does not require authentication, user interaction, or elevated privileges, but it does require local network access to the MQTT broker controlling the EVSE. The CVSS 4.0 vector indicates low attack complexity and no privileges required, but the attack vector is local (AV:L), limiting remote exploitation to those with MQTT access. The vulnerability affects all versions of everest-core prior to 2026.02.0, where the issue has been patched. No exploits have been observed in the wild to date. The vulnerability primarily impacts the availability of EV charging stations relying on the affected software, potentially causing service disruptions and operational downtime.

Potential Impact

The primary impact of CVE-2026-27828 is on the availability of EV charging infrastructure components using the vulnerable everest-core software. Successful exploitation results in a crash of the EVSE process, causing denial of service and potentially interrupting EV charging sessions. This can lead to operational disruptions for EV drivers and charging station operators, affecting user experience and potentially causing financial losses. Given the increasing reliance on EV charging networks, widespread exploitation could degrade trust in EV infrastructure. While confidentiality and integrity impacts are not evident, the availability impact is significant for critical infrastructure. The requirement for MQTT access limits the attack surface to local or network-adjacent attackers, reducing the likelihood of large-scale remote exploitation but still posing a risk in environments with insufficient network segmentation or exposed MQTT brokers.

Mitigation Recommendations

Organizations should immediately upgrade everest-core to version 2026.02.0 or later, which contains the patch for this use-after-free vulnerability. In addition to patching, network segmentation should be enforced to restrict MQTT access only to trusted entities and devices, minimizing the risk of unauthorized command injection. Implement strict access controls and authentication mechanisms on MQTT brokers to prevent unauthorized access. Monitoring and logging MQTT traffic can help detect anomalous session_setup commands indicative of exploitation attempts. Employ runtime protections such as memory safety tools or address sanitizers during development and testing to catch similar issues early. Finally, conduct regular security assessments of EVSE software components and maintain an incident response plan to quickly address potential disruptions caused by such vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.800Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c562cdf4197a8e3be49a87

Added to database: 3/26/2026, 4:46:05 PM

Last enriched: 3/26/2026, 5:02:16 PM

Last updated: 3/26/2026, 6:26:50 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses