top of page
perceptive_background_267k.jpg

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifie…

Published:

5 maart 2026 om 23:00:00

Alert date:

6 maart 2026 om 17:02:47

Source:

nvd.nist.gov

Click to open the original link from this advisory

Critical Infrastructure, Web Technologies, Mobile & IoT

A vulnerability in WebSocket backend implementation allows session hijacking through predictable charging station identifiers. Multiple endpoints can connect using the same session identifier, enabling attackers to displace legitimate charging stations and intercept backend commands. This flaw permits unauthorized authentication and potential denial-of-service attacks by overwhelming the backend with valid session requests. The vulnerability affects charging station communication systems and poses significant security risks to infrastructure operations.

Technical details

Mitigation steps:

Affected products:

WebSocket backend
Charging station systems

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page