


Perceptive Security
SOC/SIEM Consultancy

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifie…
Published:
5 maart 2026 om 23:00:00
Alert date:
6 maart 2026 om 01:01:36
Source:
nvd.nist.gov
Critical Infrastructure, Web Technologies, Mobile & IoT
A vulnerability in WebSocket backend implementation for charging stations allows session hijacking through predictable session identifiers. Multiple endpoints can connect using the same session identifier, enabling attackers to displace legitimate charging stations and intercept backend commands. The flaw permits unauthorized authentication as other users and potential denial-of-service attacks by overwhelming the backend with valid session requests. The vulnerability affects the session management system that uses charging station identifiers for unique session association.
Technical details
Mitigation steps:
Affected products:
WebSocket backend
Charging station systems
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-24912
https://epower.ie/support/
https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-062-07.json
https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-07
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
