2026 Futuriom 50: Highlights →Explore

Executive Summary

In March 2026, multiple critical vulnerabilities were identified in Everon's OCPP Backends, affecting all versions of the platform. These vulnerabilities include missing authentication for critical functions, improper restriction of excessive authentication attempts, insufficient session expiration, and insufficiently protected credentials. Exploitation of these flaws could allow attackers to gain unauthorized administrative control over charging stations or disrupt services through denial-of-service attacks. (incibe.es)

The discovery of these vulnerabilities underscores the growing cybersecurity risks within the electric vehicle (EV) charging infrastructure. As the adoption of EVs accelerates, ensuring the security of charging networks becomes paramount to prevent potential operational disruptions and safeguard user data.

Why This Matters Now

The identification of these vulnerabilities highlights the urgent need for enhanced security measures in EV charging infrastructures to prevent unauthorized access and service disruptions.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The vulnerabilities include missing authentication for critical functions, improper restriction of excessive authentication attempts, insufficient session expiration, and insufficiently protected credentials.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to exploit unauthenticated WebSocket endpoints, thereby reducing the potential for lateral movement and data exfiltration within the network.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Implementing identity-aware policies would likely have constrained unauthorized access by ensuring only authenticated entities could communicate with the WebSocket endpoints.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Enforcing least-privilege access controls would likely have restricted the attacker's ability to escalate privileges by limiting command execution to authorized entities.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Implementing east-west traffic controls would likely have limited the attacker's ability to move laterally by restricting unauthorized inter-system communications.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Enhanced visibility and control would likely have identified and constrained unauthorized command and control channels, limiting the attacker's persistent access.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Enforcing egress policies would likely have restricted unauthorized data exfiltration by controlling outbound data flows.

Impact (Mitigations)

While prior controls would likely have constrained the attacker's activities, any residual impact would be limited to isolated systems, reducing overall operational disruption.

Impact at a Glance

Affected Business Functions

  • Charging Station Operations
  • Customer Billing
  • Energy Management
Operational Disruption

Estimated downtime: N/A

Financial Impact

Estimated loss: N/A

Data Exposure

Potential exposure of charging station operational data and customer usage patterns.

Recommended Actions

  • Implement robust authentication mechanisms for all WebSocket endpoints to prevent unauthorized access.
  • Enforce Zero Trust Segmentation to limit lateral movement within the network.
  • Deploy East-West Traffic Security controls to monitor and restrict internal traffic flows.
  • Utilize Threat Detection & Anomaly Response systems to identify and respond to suspicious activities promptly.
  • Establish Egress Security & Policy Enforcement to control outbound traffic and prevent data exfiltration.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image