top of page
perceptive_background_267k.jpg

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifie…

Published:

5 maart 2026 om 23:00:00

Alert date:

6 maart 2026 om 01:01:36

Source:

nvd.nist.gov

Click to open the original link from this advisory

Critical Infrastructure, Web Technologies, Mobile & IoT

A vulnerability in WebSocket backend implementation for charging stations allows session hijacking through predictable session identifiers. Multiple endpoints can connect using the same session identifier, enabling attackers to displace legitimate charging stations and intercept backend commands. The flaw permits unauthorized authentication as other users and potential denial-of-service attacks by overwhelming the backend with valid session requests. The vulnerability affects the session management system that uses charging station identifiers for unique session association.

Technical details

Mitigation steps:

Affected products:

WebSocket backend
Charging station systems

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page