CVE-2026-27828

EVerest is an EV charging software stack. Prior to version 2026.02.0, ISO15118_chargerImpl::handle_session_setup uses v2g_ctx after it has been freed when ISO15118 initialization fails (e.g., no IPv6 link-local address). The EVSE process can be crashed remotely by an attacker with MQTT access who issues a session_setup command while v2g_ctx has been released. Version 2026.02.0 contains a patch.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*

History

31 Mar 2026, 14:47

Type Values Removed Values Added
CPE cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
References () https://github.com/EVerest/EVerest/security/advisories/GHSA-5g3v-qc79-qqwr - () https://github.com/EVerest/EVerest/security/advisories/GHSA-5g3v-qc79-qqwr - Mitigation, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Linuxfoundation
Linuxfoundation everest

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) EVerest es una pila de software de carga de vehículos eléctricos. Antes de la versión 2026.02.0, ISO15118_chargerImpl::handle_session_setup utiliza v2g_ctx después de que ha sido liberado cuando la inicialización de ISO15118 falla (p. ej., no hay dirección IPv6 link-local). El proceso EVSE puede ser colapsado remotamente por un atacante con acceso MQTT que emite un comando session_setup mientras v2g_ctx ha sido liberado. La versión 2026.02.0 contiene un parche.

26 Mar 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 17:16

Updated : 2026-03-31 14:47


NVD link : CVE-2026-27828

Mitre link : CVE-2026-27828

CVE.ORG link : CVE-2026-27828


JSON object : View

Products Affected

linuxfoundation

  • everest
CWE
CWE-416

Use After Free