CVE-2026-24912 PUBLISHED

ePower epower.ie Insufficient Session Expiration

Assigner: icscert
Reserved: 24.02.2026 Published: 05.03.2026 Updated: 09.03.2026

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
CVSS Score: 6.9

Product Status

Vendor ePower
Product epower.ie
Versions Default: unaffected
  • Version All versions is affected

Workarounds

ePower did not respond to CISA's request for coordination. Contact ePower using their contact page here: https://epower.ie/support/ for more information.

Credits

  • Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA. finder

References

Problem Types

  • CWE-613 CWE