CVE-2026-22540

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to cause a denial of service on electric vehicle charger control boards by flooding them with ARP requests. When exploited, this prevents the charger from functioning properly. This affects electric vehicle charging systems using vulnerable control boards.

💻 Affected Systems

Products:
  • Thales EV charger control boards
Versions: Specific versions not disclosed in available information
Operating Systems: Embedded systems on charger control boards
Default Config Vulnerable: ⚠️ Yes
Notes: Affects boards controlling EV interfaces in charging systems. Requires network access to the charger's control network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete charger failure preventing EV charging, potentially disrupting charging infrastructure and causing operational impacts at charging stations.

🟠

Likely Case

Temporary charger unavailability requiring manual reset or maintenance intervention to restore functionality.

🟢

If Mitigated

Minimal impact with proper network segmentation and ARP request rate limiting in place.

🌐 Internet-Facing: MEDIUM - Chargers with direct internet connectivity could be targeted remotely, but requires specific network access.
🏢 Internal Only: HIGH - Internal network access allows direct ARP flooding attacks against vulnerable chargers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ARP flooding is a well-known network attack technique requiring only network access to the target segment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://cds.thalesgroup.com/en

Restart Required: No

Instructions:

Check Thales advisory for specific firmware updates. Apply any available patches following vendor instructions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charger control networks from general network traffic

ARP Rate Limiting

all

Configure network devices to limit ARP request rates

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate charger control networks
  • Deploy network monitoring and intrusion detection for ARP flooding patterns

🔍 How to Verify

Check if Vulnerable:

Check if charger control board is on a network segment accessible to potential attackers and lacks ARP flood protection

Check Version:

Consult Thales documentation for board firmware version checking procedures

Verify Fix Applied:

Test ARP request handling after implementing network controls or patches

📡 Detection & Monitoring

Log Indicators:

  • Unusual ARP traffic volume
  • Charger board reset events
  • Network interface errors

Network Indicators:

  • High volume of ARP requests to charger IP addresses
  • Unusual ARP broadcast traffic

SIEM Query:

source_ip=* AND protocol=arp AND packet_count>1000 WITHIN 1 MINUTE

🔗 References

📤 Share & Export