WebSocket endpoints lack proper authentication mechanisms, enabling
attackers to perform unauthorized station impersonation and manipulate
data sent to the backend. An unauthenticated attacker can connect to the
OCPP WebSocket endpoint using a known or discovered charging station
identifier, then issue or receive OCPP commands as a legitimate charger.
Given that no authentication is required, this can lead to privilege
escalation, unauthorized control of charging infrastructure, and
corruption of charging network data reported to the backend.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-06.json | Third Party Advisory |
| https://swtchenergy.com/contact/ | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-06 | Third Party Advisory US Government Resource |
Configurations
History
02 Mar 2026, 18:27
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-06.json - Third Party Advisory | |
| References | () https://swtchenergy.com/contact/ - Product | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-06 - Third Party Advisory, US Government Resource | |
| First Time |
Swtchenergy swtchenergy.com
Swtchenergy |
|
| CPE | cpe:2.3:a:swtchenergy:swtchenergy.com:*:*:*:*:*:*:*:* |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 00:16
Updated : 2026-03-05 21:16
NVD link : CVE-2026-27767
Mitre link : CVE-2026-27767
CVE.ORG link : CVE-2026-27767
JSON object : View
Products Affected
swtchenergy
- swtchenergy.com
CWE
CWE-306
Missing Authentication for Critical Function
