VulnerabilitiesCRITICAL

Critical Vulnerabilities Found in EV Charging Stations

CICISA Advisories19h ago2 min read
CVE-2026-27772CVE-2026-24445CVE-2026-26290CVE-2026-25774EV Energy
🎯

Basically, hackers can control charging stations and disrupt services due to security flaws.

Quick Summary

Critical vulnerabilities have been found in EV Energy's charging stations, risking unauthorized control and service disruptions. This affects electric vehicle users worldwide. Stay alert for updates and potential fixes from EV Energy.

What Happened

A serious security issue has been uncovered in EV Energy's charging stations, affecting users worldwide. Hackers can exploit these vulnerabilities to gain unauthorized control over charging stations or disrupt services entirely. This is not just a minor glitch; it poses a significant risk to the infrastructure that supports electric vehicle charging.

The vulnerabilities, identified as CVE-2026-27772, CVE-2026-24445, CVE-2026-26290, and CVE-2026-25774, allow attackers to manipulate data, impersonate charging stations, and even launch denial-of-service attacks?. This means that a malicious actor could potentially shut down charging services or redirect them, causing chaos for EV users who rely on them.

These issues stem from design flaws in the WebSocket? API used by EV Energy. For instance, one vulnerability allows attackers to connect to the system without proper authentication?, while another lacks restrictions on the number of authentication? requests, making it easier for attackers to flood the system with requests, leading to service disruptions.

Why Should You Care

If you own an electric vehicle or rely on charging stations, this is a big deal for you. Imagine pulling up to a charging station only to find it offline or manipulated by someone who shouldn’t have access. These vulnerabilities could disrupt your ability to charge your vehicle, affecting your daily commute or travel plans.

Moreover, as electric vehicles become more popular, the security of the infrastructure supporting them becomes increasingly critical. Just like you wouldn’t want someone tampering with the gas pumps at a station, you don’t want hackers messing with charging stations. Your safety and convenience depend on the reliability of these systems.

What's Being Done

Currently, EV Energy has not responded to requests for coordination from the Cybersecurity and Infrastructure Security Agency (CISA). However, they are aware of the vulnerabilities and are expected to issue fixes soon. Here’s what you can do right now:

  • Stay informed about updates from EV Energy regarding patches.
  • Avoid using charging stations until the vulnerabilities are addressed.
  • Monitor your vehicle’s charging status closely.

Experts are keeping a close eye on this situation to see how quickly EV Energy can roll out fixes and whether any attacks will occur before those patches are implemented.

💡 Tap dotted terms for explanations

🔒 Pro insight: The vulnerabilities align with common patterns in IoT security failures, highlighting the need for robust authentication mechanisms in critical infrastructure.

Original article from

CISA Advisories · CISA

Read Full Article

Related Pings

HIGHVulnerabilities

HttpOnly Cookies at Risk from New 'Cookie Sandwich' Technique

A new technique called 'cookie sandwich' can steal secure cookies from websites. This affects users relying on HttpOnly flags for protection. Stay informed and ensure your online security measures are up to date.

PortSwigger Research·36m ago·2m
HIGHVulnerabilities

Exploitation Alert: Gladinet Vulnerability Targets Cryptography

A vulnerability in Gladinet's CentreStack and Triofox software is being actively exploited. Users are at risk of data breaches due to hardcoded cryptographic keys. Gladinet is working on a fix, but immediate action is needed to secure your systems.

Huntress Blog·36m ago·2m
HIGHVulnerabilities

XSS Vulnerability Found in RPi-Jukebox-RFID 2.8.0

A serious XSS vulnerability has been found in RPi-Jukebox-RFID 2.8.0. Users are at risk of attackers injecting harmful scripts. Update your software immediately to protect your device and data.

Exploit-DB·36m ago·2m
HIGHVulnerabilities

Hacked Construction Apps Threaten Jobsite Security

Hacked construction apps are exposing job sites to security risks. This affects contractors and workers alike, leading to potential project delays and safety issues. Stay updated on software patches and security measures to protect your projects.

Huntress Blog·36m ago·2m
HIGHVulnerabilities

URL Validation Bypass Cheat Sheet Gets Powerful New Payloads

A new update to the URL Validation Bypass Cheat Sheet introduces powerful payloads for web security experts. This matters because weak URL validations can lead to serious security breaches. Stay informed and protect your online activities!

PortSwigger Research·36m ago·2m
HIGHVulnerabilities

Windows 10 Faces Spoofing Vulnerability Risk

A spoofing vulnerability has been found in Windows 10 version 10.0.17763.7009. This flaw could allow attackers to impersonate legitimate users, risking your sensitive information. Microsoft is working on a patch, so stay alert and update your system when available.

Exploit-DB·36m ago·2m