Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33015: CWE-863: Incorrect Authorization in EVerest everest-core

0
Medium
VulnerabilityCVE-2026-33015cvecve-2026-33015cwe-863
Published: Thu Mar 26 2026 (03/26/2026, 16:42:50 UTC)
Source: CVE Database V5
Vendor/Project: EVerest
Product: everest-core

Description

EVerest is an EV charging software stack. Prior to version 2026.02.0, even immediately after CSMS performs a RemoteStop (StopTransaction), the EVSE can return to `PrepareCharging` via the EV's BCB toggle, allowing session restart. This breaks the irreversibility of remote stop and can bypass operational/billing/safety controls. Version 2026.02.0 contains a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 17:33:47 UTC

Technical Analysis

CVE-2026-33015 is an authorization bypass vulnerability classified under CWE-863 (Incorrect Authorization) affecting the everest-core component of the EVerest EV charging software stack. EVerest manages electric vehicle charging sessions, including remote control commands from the CSMS. Prior to version 2026.02.0, when the CSMS issues a RemoteStop command (StopTransaction) to terminate a charging session, the EVSE is expected to irreversibly stop the session to enforce operational, billing, and safety policies. However, due to improper authorization checks, the EVSE can revert to the PrepareCharging state triggered by the EV's BCB (Battery Control Box) toggle. This allows the charging session to restart without CSMS consent, effectively bypassing the remote stop command. The vulnerability compromises the integrity of session control, undermining billing accuracy and safety mechanisms designed to prevent unauthorized or unsafe charging. The CVSS 3.1 vector (AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L) indicates the attack requires physical proximity (local network or direct EVSE access), has low complexity, no privileges or user interaction, and impacts integrity and availability moderately. No public exploits have been reported, but the flaw poses a risk to EV charging infrastructure reliability and trustworthiness. The vendor patched the issue in version 2026.02.0, correcting the authorization logic to enforce irreversible session termination upon RemoteStop commands.

Potential Impact

This vulnerability can lead to unauthorized restarting of EV charging sessions after a remote stop command, which can have several negative consequences for organizations operating EV charging infrastructure. Operationally, it undermines the control CSMS has over charging sessions, potentially allowing users or attackers to bypass session termination. This can result in inaccurate billing, as sessions may continue without proper authorization or accounting. From a safety perspective, the ability to restart charging without CSMS approval could lead to unsafe charging conditions or violate regulatory requirements. The integrity of session management is compromised, which may erode trust in the charging infrastructure. While the attack requires local or physical access to the EVSE or EV, the widespread deployment of EV charging stations increases the attack surface. Organizations relying on affected versions risk financial losses, regulatory penalties, and reputational damage if this vulnerability is exploited. The lack of confidentiality impact limits data exposure risks, but the integrity and availability impacts are significant for critical EV charging operations.

Mitigation Recommendations

Organizations should immediately upgrade all EVerest everest-core deployments to version 2026.02.0 or later, where the authorization flaw has been patched. Until upgrades are complete, physical and network access to EVSE devices should be tightly controlled to prevent unauthorized toggling of the EV's BCB. Implement network segmentation and access controls to restrict EVSE management interfaces to trusted personnel and systems only. Monitor EVSE logs and charging session states for anomalous PrepareCharging transitions following RemoteStop commands, which may indicate exploitation attempts. Incorporate multi-factor authentication and role-based access controls in CSMS and EVSE management systems to reduce risk of unauthorized commands. Conduct regular security audits and penetration testing focused on EVSE session management logic. Coordinate with EVSE manufacturers and vendors to ensure timely patch deployment and verify firmware integrity. Finally, update incident response plans to include scenarios involving EV charging session manipulation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T17:22:14.666Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c569d6f4197a8e3be94d74

Added to database: 3/26/2026, 5:16:06 PM

Last enriched: 3/26/2026, 5:33:47 PM

Last updated: 3/26/2026, 7:44:22 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses