This vulnerability occurs when the system permits multiple simultaneous
connections to the backend using the same charging station ID. This can
result in unauthorized access, data inconsistency, or potential
manipulation of charging sessions. The lack of proper session management
and expiration control allows attackers to exploit this weakness by
reusing valid charging station IDs to establish multiple sessions
concurrently.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json | Third Party Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 | Third Party Advisory US Government Resource |
Configurations
History
12 Feb 2026, 18:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json - Third Party Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08 - Third Party Advisory, US Government Resource | |
| First Time |
Evmapa evmapa
Evmapa |
|
| CPE | cpe:2.3:a:evmapa:evmapa:*:*:*:*:*:*:*:* |
22 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-22 23:15
Updated : 2026-02-12 18:02
NVD link : CVE-2025-55705
Mitre link : CVE-2025-55705
CVE.ORG link : CVE-2025-55705
JSON object : View
Products Affected
evmapa
- evmapa
CWE
CWE-613
Insufficient Session Expiration
