CVE-2026-24696

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass rate limiting on WebSocket authentication requests, enabling denial-of-service attacks that disrupt legitimate charger telemetry or brute-force attacks to gain unauthorized access. It affects systems using the vulnerable WebSocket API implementation, particularly in industrial control and charging infrastructure.

💻 Affected Systems

Products:
  • WebSocket API implementations in charging/telemetry systems
Versions: All versions prior to patched release
Operating Systems: All platforms running vulnerable WebSocket API
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects systems where WebSocket authentication lacks rate limiting controls.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of charger telemetry systems leading to operational shutdown, or unauthorized access to critical control systems allowing manipulation of charging infrastructure.

🟠

Likely Case

Service degradation through DoS attacks affecting telemetry data reliability, or successful brute-force attacks on weaker credentials.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring in place, though authentication attempts may still be logged.

🌐 Internet-Facing: HIGH - WebSocket APIs exposed to internet are directly vulnerable to automated attacks without rate limiting.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but network segmentation reduces external threat surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to authentication endpoints but is technically simple using automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific version

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-08

Restart Required: Yes

Instructions:

1. Review vendor advisory for patch details. 2. Apply vendor-provided patch. 3. Restart affected services. 4. Verify rate limiting is functioning.

🔧 Temporary Workarounds

Implement WebSocket Rate Limiting

all

Add rate limiting to WebSocket authentication endpoints using reverse proxy or application controls

# Example nginx rate limiting:
limit_req_zone $binary_remote_addr zone=ws_auth:10m rate=10r/m;
location /ws-auth {
    limit_req zone=ws_auth burst=20 nodelay;
    proxy_pass http://backend;
}

Network Segmentation

linux

Restrict access to WebSocket endpoints to trusted networks only

# Example iptables rule:
iptables -A INPUT -p tcp --dport 443 -s 192.168.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement network-level rate limiting using WAF or firewall rules
  • Enable detailed authentication logging and monitoring for brute-force attempts

🔍 How to Verify

Check if Vulnerable:

Test WebSocket authentication endpoint with rapid consecutive requests; if unlimited attempts are allowed, system is vulnerable.

Check Version:

Check application version via vendor-specific command or configuration file

Verify Fix Applied:

Attempt rapid authentication requests; verify requests are throttled or blocked after threshold.

📡 Detection & Monitoring

Log Indicators:

  • High frequency of authentication failures from single IP
  • WebSocket connection spikes
  • Authentication timeout errors

Network Indicators:

  • Unusual WebSocket traffic patterns
  • High volume of small authentication packets
  • Sustained connections to WebSocket ports

SIEM Query:

source="websocket.log" | stats count by src_ip, user | where count > 100

🔗 References

📤 Share & Export