WebSocket endpoints lack proper authentication mechanisms, enabling
attackers to perform unauthorized station impersonation and manipulate
data sent to the backend. An unauthenticated attacker can connect to the
OCPP WebSocket endpoint using a known or discovered charging station
identifier, then issue or receive OCPP commands as a legitimate charger.
Given that no authentication is required, this can lead to privilege
escalation, unauthorized control of charging infrastructure, and
corruption of charging network data reported to the backend.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-07.json | Third Party Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-07 | Third Party Advisory US Government Resource |
| https://www.ev.energy/en-us | Product |
Configurations
History
02 Mar 2026, 15:46
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-07.json - Third Party Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-07 - Third Party Advisory, US Government Resource | |
| References | () https://www.ev.energy/en-us - Product | |
| First Time |
Ev.energy
Ev.energy ev.energy |
|
| CPE | cpe:2.3:a:ev.energy:ev.energy:*:*:*:*:*:*:*:* |
27 Feb 2026, 14:06
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Feb 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-27 00:16
Updated : 2026-03-05 21:16
NVD link : CVE-2026-27772
Mitre link : CVE-2026-27772
CVE.ORG link : CVE-2026-27772
JSON object : View
Products Affected
ev.energy
- ev.energy
CWE
CWE-306
Missing Authentication for Critical Function
