CVE-2026-22539

N/A Unknown

📋 TL;DR

This vulnerability allows unauthenticated attackers with knowledge of the OCPP v1.6 protocol to obtain information from electric vehicle chargers. It affects Thales EV charging systems that use OCPP v1.6 without proper authentication controls. The exposure could reveal charger status, configuration, and potentially operational data.

💻 Affected Systems

Products:
  • Thales electric vehicle charging systems
Versions: All versions using OCPP v1.6 without authentication
Operating Systems: Embedded systems in EV chargers
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects systems where OCPP v1.6 service interaction is configured without authentication requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map all chargers in a network, gather operational intelligence for physical attacks, or potentially manipulate charging sessions if combined with other vulnerabilities.

🟠

Likely Case

Information disclosure about charger locations, status, configurations, and potentially user data if improperly stored.

🟢

If Mitigated

Limited to protocol-level information gathering without access to sensitive user data or control functions.

🌐 Internet-Facing: HIGH - Chargers exposed to the internet without authentication are directly vulnerable to scanning and information gathering.
🏢 Internal Only: MEDIUM - Internal network access still allows information gathering but requires network foothold first.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires only knowledge of OCPP v1.6 protocol and network access.

Exploitation involves sending standard OCPP v1.6 queries without authentication to gather information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://cds.thalesgroup.com/en

Restart Required: No

Instructions:

1. Consult Thales advisory for specific guidance. 2. Implement authentication for OCPP v1.6 service interactions. 3. Configure network access controls to limit OCPP traffic.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate EV charging systems from untrusted networks

Firewall Rules

all

Restrict OCPP protocol access to authorized management systems only

🧯 If You Can't Patch

  • Implement network-level authentication or VPN for OCPP communications
  • Monitor OCPP traffic for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Attempt OCPP v1.6 protocol queries without authentication to see if charger responds with information.

Check Version:

Check charger management interface or consult vendor documentation for OCPP configuration.

Verify Fix Applied:

Verify that OCPP v1.6 queries now require authentication and reject unauthenticated requests.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated OCPP protocol requests
  • Multiple failed authentication attempts on OCPP port

Network Indicators:

  • OCPP v1.6 traffic from unauthorized IP addresses
  • Protocol queries without preceding authentication handshake

SIEM Query:

source_ip NOT IN authorized_management_ips AND protocol=OCPP AND auth_status=failed

🔗 References

📤 Share & Export