


Perceptive Security
SOC/SIEM Consultancy

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifie…
Published:
5 March 2026 at 23:00:00
Alert date:
6 March 2026 at 17:02:47
Source:
nvd.nist.gov
Critical Infrastructure, Web Technologies, Mobile & IoT
A vulnerability in WebSocket backend implementation allows session hijacking through predictable charging station identifiers. Multiple endpoints can connect using the same session identifier, enabling attackers to displace legitimate charging stations and intercept backend commands. This flaw permits unauthorized authentication and potential denial-of-service attacks by overwhelming the backend with valid session requests. The vulnerability affects charging station communication systems and poses significant security risks to infrastructure operations.
Technical details
Mitigation steps:
Affected products:
WebSocket backend
Charging station systems
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-27764
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-062-06.json
https://mobiliti.hu/emobilitas/ugyfeltamogatas/ugyfelszolgalat
https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-06
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
