CVE-2026-22552
Published: 06 March 2026
Description
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue…
more
or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.
Mitigating Controls (NIST 800-53 r5)AI
Requires unique identification and authentication of charging stations as devices before establishing WebSocket connections, directly preventing unauthorized impersonation and command issuance.
Explicitly identifies, authorizes, monitors, and reviews actions permitted without authentication, ensuring no critical OCPP WebSocket functions like station impersonation are allowed unauthenticated.
Mandates authentication of service users (charging stations) by the OCPP WebSocket service before establishing communications, blocking unauthenticated connections and data manipulation.
Security SummaryAI
CVE-2026-22552 involves WebSocket endpoints that lack proper authentication mechanisms, classified under CWE-306 (Missing Authentication for Critical Function). This vulnerability affects OCPP WebSocket endpoints used for communication between charging stations and backend systems in electric vehicle charging infrastructure. Attackers can exploit the absence of authentication to perform unauthorized station impersonation and manipulate data transmitted to the backend, with a CVSS v3.1 base score of 9.4 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L).
An unauthenticated attacker with network access can connect to the OCPP WebSocket endpoint by using a known or discovered charging station identifier. Once connected, the attacker can issue or receive OCPP commands as if acting as a legitimate charger, resulting in privilege escalation, unauthorized control over charging infrastructure, and corruption of charging network data reported to the backend.
Mitigation guidance is detailed in official advisories, including CISA ICS Advisory ICSA-26-062-07 available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-07, the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-062-07.json, and vendor support resources at https://epower.ie/support/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables exploitation of a public-facing WebSocket application (T1190), allows impersonation of charging stations due to missing authentication (T1656), and facilitates manipulation of transmitted data to the backend (T1565.002).