CVE-2025-68135
📋 TL;DR
This vulnerability in EVerest EV charging software allows unhandled C++ exceptions in the TbdController loop to cause silent termination of the controller and its caller. This leads to denial of service for SDP and ISO15118-20 servers, affecting all EV charging stations running vulnerable EVerest versions.
💻 Affected Systems
- EVerest EV charging software stack
📦 What is this software?
Everest by Linuxfoundation
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of EV charging services at affected stations, preventing vehicles from charging and potentially causing cascading failures in charging networks.
Likely Case
Intermittent charging service outages at individual stations when exceptions are triggered, requiring manual restart of affected components.
If Mitigated
Minimal impact with proper monitoring and automated restart mechanisms in place to detect and recover from component failures.
🎯 Exploit Status
Exploitation requires triggering C++ exceptions in the TbdController loop, which could occur through malformed network packets or unexpected system conditions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.10.0
Vendor Advisory: https://github.com/EVerest/everest-core/security/advisories/GHSA-g7mm-r6qp-96vh
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Update EVerest to version 2025.10.0 or later. 3. Restart all EVerest services. 4. Verify functionality of charging services.
🔧 Temporary Workarounds
Implement external monitoring and restart
linuxDeploy external monitoring to detect TbdController failures and automatically restart the service
# Example systemd service restart on failure
[Service]
Restart=on-failure
RestartSec=5s
🧯 If You Can't Patch
- Implement network segmentation to isolate charging infrastructure from untrusted networks
- Deploy rate limiting and input validation at network perimeter to filter malformed packets
🔍 How to Verify
Check if Vulnerable:
Check EVerest version with: everest --version or examine installed package version
Check Version:
everest --version
Verify Fix Applied:
Verify version is 2025.10.0 or later and test SDP/ISO15118-20 server functionality under stress conditions
📡 Detection & Monitoring
Log Indicators:
- Unexpected termination of TbdController process
- C++ exception stack traces in logs
- SDP/ISO15118-20 service failures
Network Indicators:
- Sudden drop in charging station network traffic
- Failed ISO15118-20 handshakes
SIEM Query:
process_name:"TbdController" AND event_type:"process_termination"