WebSocket endpoints lack proper authentication mechanisms, enabling
attackers to perform unauthorized station impersonation and manipulate
data sent to the backend. An unauthenticated attacker can connect to the
OCPP WebSocket endpoint using a known or discovered charging station
identifier, then issue or receive OCPP commands as a legitimate charger.
Given that no authentication is required, this can lead to privilege
escalation, unauthorized control of charging infrastructure, and
corruption of charging network data reported to the backend.
References
| Link | Resource |
|---|---|
| https://cloudcharge.tech/support/contact/ | Product |
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-03.json | Third Party Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-03 | Third Party Advisory US Government Resource |
Configurations
History
02 Mar 2026, 18:31
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cloudcharge.tech/support/contact/ - Product | |
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-03.json - Third Party Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-03 - Third Party Advisory, US Government Resource | |
| CPE | cpe:2.3:a:cloudcharge:cloudcharge.se:*:*:*:*:*:*:*:* | |
| First Time |
Cloudcharge
Cloudcharge cloudcharge.se |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 00:16
Updated : 2026-03-05 20:16
NVD link : CVE-2026-20781
Mitre link : CVE-2026-20781
CVE.ORG link : CVE-2026-20781
JSON object : View
Products Affected
cloudcharge
- cloudcharge.se
CWE
CWE-306
Missing Authentication for Critical Function
