Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29796: CWE-306 in IGL-Technologies eParking.fi

0
Critical
VulnerabilityCVE-2026-29796cvecve-2026-29796cwe-306
Published: Fri Mar 20 2026 (03/20/2026, 22:53:27 UTC)
Source: CVE Database V5
Vendor/Project: IGL-Technologies
Product: eParking.fi

Description

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:22:43 UTC

Technical Analysis

CVE-2026-29796 is a critical security vulnerability identified in the eParking.fi product by IGL-Technologies, affecting all versions of the software. The root cause is the absence of authentication mechanisms on WebSocket endpoints that handle OCPP communications between charging stations and the backend system. OCPP is a protocol widely used for managing electric vehicle charging stations. Due to the lack of authentication, an attacker can connect to the WebSocket endpoint by using a known or discovered charging station identifier, effectively impersonating that station. This unauthorized access allows the attacker to send or receive OCPP commands as if they were the legitimate charger, leading to privilege escalation and unauthorized control over the charging infrastructure. The attacker can manipulate charging sessions, disrupt operations, and corrupt data reported to the backend, potentially impacting billing, usage statistics, and operational monitoring. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function), emphasizing the failure to enforce authentication on critical communication channels. The CVSS v3.1 score of 9.4 indicates a critical severity with network attack vector, no required privileges or user interaction, and high impact on confidentiality and integrity, with some impact on availability. Despite the severity, no patches or mitigations have been published yet, and no known exploits have been observed in the wild. This vulnerability poses a significant threat to organizations relying on eParking.fi for managing EV charging infrastructure.

Potential Impact

The impact of CVE-2026-29796 is substantial for organizations operating electric vehicle charging networks using eParking.fi. Unauthorized attackers can impersonate legitimate charging stations, gaining control over charging sessions, potentially causing financial losses through fraudulent charging or denial of service by disrupting charging availability. The integrity of charging data, such as usage logs and billing information, can be compromised, leading to inaccurate reporting and potential disputes. Confidentiality is also at risk, as attackers may intercept or manipulate sensitive operational data. The disruption of charging infrastructure can affect customer trust and operational continuity, especially for public or commercial charging networks. Additionally, attackers could leverage this access to pivot within the network, escalating privileges or launching further attacks on backend systems. The lack of authentication on critical communication channels represents a severe security gap that could be exploited at scale, affecting multiple stations and users simultaneously.

Mitigation Recommendations

Given the absence of official patches, organizations should implement compensating controls immediately. First, restrict network access to the WebSocket endpoints by implementing network segmentation and firewall rules to allow connections only from trusted charging stations or management systems. Employ VPNs or secure tunnels to protect communications between charging stations and backend systems. Monitor network traffic for anomalous connections or unexpected OCPP commands indicative of impersonation attempts. Implement strong logging and alerting on WebSocket connections to detect unauthorized access. Where possible, deploy application-layer proxies or gateways that enforce authentication and authorization before forwarding OCPP commands to the backend. Engage with IGL-Technologies for updates and patches, and plan for rapid deployment once available. Additionally, conduct regular security assessments of the charging infrastructure and update incident response plans to address potential exploitation of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T20:17:17.751Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdd4681188d0bb0cbbf678

Added to database: 3/20/2026, 11:12:40 PM

Last enriched: 3/20/2026, 11:22:43 PM

Last updated: 3/21/2026, 12:43:49 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses