CVE-2026-22541

N/A Unknown

📋 TL;DR

This vulnerability allows attackers to cause a denial of service on EV charger control boards by flooding them with ICMP requests. When exploited, the affected board becomes unresponsive, preventing the EV charger from functioning properly. This affects EV charger systems using vulnerable control boards.

💻 Affected Systems

Products:
  • EV charger control boards from Thales
Versions: Specific versions unknown from provided information
Operating Systems: Embedded systems on control boards
Default Config Vulnerable: ⚠️ Yes
Notes: Affects boards that handle EV interface control; exact models not specified in CVE description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete EV charger failure, preventing vehicle charging and potentially disrupting charging station operations.

🟠

Likely Case

Temporary charger unavailability requiring manual reset or intervention.

🟢

If Mitigated

Minimal impact with proper network segmentation and rate limiting in place.

🌐 Internet-Facing: HIGH - If chargers are directly internet-accessible, they can be targeted from anywhere.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ICMP flooding is a well-known attack technique requiring minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://cds.thalesgroup.com/en

Restart Required: No

Instructions:

Check Thales security advisory for specific patching instructions when available.

🔧 Temporary Workarounds

Network segmentation and filtering

all

Isolate EV charger control boards from untrusted networks and implement ICMP rate limiting

Firewall ICMP restrictions

linux

Block or limit ICMP traffic to EV charger control interfaces

iptables -A INPUT -p icmp --icmp-type echo-request -m limit --limit 1/second -j ACCEPT
iptables -A INPUT -p icmp --icmp-type echo-request -j DROP

🧯 If You Can't Patch

  • Implement network segmentation to isolate charger control systems
  • Deploy network monitoring and alerting for ICMP flood patterns

🔍 How to Verify

Check if Vulnerable:

Test if ICMP flooding causes board unresponsiveness in controlled environment

Check Version:

Check board firmware version via manufacturer documentation

Verify Fix Applied:

Verify ICMP flood no longer causes service disruption after implementing controls

📡 Detection & Monitoring

Log Indicators:

  • High volume of ICMP requests to charger control interfaces
  • Board reset or service interruption logs

Network Indicators:

  • Unusually high ICMP traffic to charger control IPs
  • Pattern of ICMP floods from single sources

SIEM Query:

source_ip=* AND protocol=icmp AND dest_ip=charger_control_ip AND count>1000 per minute

🔗 References

📤 Share & Export