CVE-2026-26288

9.4 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to impersonate legitimate charging stations by connecting to WebSocket endpoints without proper authentication. Attackers can then issue OCPP commands to control charging infrastructure, manipulate data, and escalate privileges. This affects any system using vulnerable OCPP implementations with exposed WebSocket endpoints.

💻 Affected Systems

Products:
  • OCPP-compliant charging station management systems
Versions: All versions with vulnerable WebSocket implementation
Operating Systems: Linux, Windows, Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where WebSocket endpoints are exposed without proper authentication mechanisms. Configuration varies by vendor implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of charging infrastructure enabling physical damage to vehicles, grid disruption, billing fraud, and safety hazards from unauthorized charging control.

🟠

Likely Case

Unauthorized charging station impersonation leading to data manipulation, billing fraud, service disruption, and potential privilege escalation to backend systems.

🟢

If Mitigated

Limited impact with proper network segmentation and authentication, potentially only affecting isolated charging stations without critical system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only WebSocket client tools and knowledge of charging station identifiers. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-08

Restart Required: No

Instructions:

1. Consult vendor-specific security advisories 2. Implement proper WebSocket authentication 3. Apply vendor patches when available 4. Restart affected services

🔧 Temporary Workarounds

Network Segmentation

linux

Isolate charging station networks from untrusted networks

iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

WebSocket Authentication

all

Implement authentication before WebSocket connection establishment

Configure application-layer authentication in WebSocket server

🧯 If You Can't Patch

  • Implement network-level authentication using VPNs or mutual TLS
  • Deploy Web Application Firewall (WAF) with WebSocket protection rules

🔍 How to Verify

Check if Vulnerable:

Attempt WebSocket connection to OCPP endpoint without authentication using tools like wscat or custom scripts

Check Version:

Check vendor documentation for specific version commands

Verify Fix Applied:

Test that unauthenticated WebSocket connections are rejected and proper authentication is required

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized WebSocket connection attempts
  • OCPP commands from unknown station IDs
  • Authentication failure logs

Network Indicators:

  • WebSocket traffic without authentication headers
  • OCPP protocol anomalies
  • Unexpected station impersonation

SIEM Query:

source="websocket" AND (action="connect" AND NOT auth_success="true")

🔗 References

📤 Share & Export