CVE-2025-55705

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to establish multiple concurrent sessions using the same charging station ID due to improper session management. This can lead to unauthorized access, data manipulation, and disruption of charging operations. It affects electric vehicle charging management systems that lack proper session expiration controls.

💻 Affected Systems

Products:
  • Electric vehicle charging management systems
Versions: Specific versions not specified in CVE description
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems that allow multiple connections with same charging station ID without proper session validation

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging infrastructure allowing attackers to manipulate billing data, disrupt charging services, or gain unauthorized access to backend systems.

🟠

Likely Case

Session hijacking leading to unauthorized charging sessions, data inconsistency, and potential billing manipulation.

🟢

If Mitigated

Limited impact with proper session management and monitoring in place, potentially only causing minor service disruptions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid charging station ID but no authentication for multiple concurrent sessions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08

Restart Required: No

Instructions:

1. Review vendor advisory at provided URL
2. Implement proper session management controls
3. Add session expiration and validation mechanisms

🔧 Temporary Workarounds

Implement Session Locking

all

Prevent multiple concurrent sessions with same charging station ID

# Configure session management to enforce single session per ID

Add Session Timeout

all

Automatically expire inactive sessions

# Set session timeout to 5-10 minutes

🧯 If You Can't Patch

  • Implement network segmentation to isolate charging infrastructure
  • Deploy monitoring for multiple connections with same station ID

🔍 How to Verify

Check if Vulnerable:

Attempt to establish multiple concurrent connections using same charging station ID

Check Version:

# Check system version against vendor advisory

Verify Fix Applied:

Test that only one active session is allowed per charging station ID

📡 Detection & Monitoring

Log Indicators:

  • Multiple connection attempts with same station ID
  • Concurrent sessions from same station

Network Indicators:

  • Multiple TCP connections from same source with same session ID

SIEM Query:

source_ip:charging_station AND event_type:connection AND count > 1

🔗 References

📤 Share & Export