CVE-2026-25778 PUBLISHED

SWITCH EV swtchenergy.com Insufficient Session Expiration

Assigner: icscert
Reserved: 23.02.2026 Published: 27.02.2026 Updated: 27.02.2026

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CVSS Score: 7.3

Product Status

Vendor SWITCH EV
Product swtchenergy.com
Versions Default: unaffected
  • Version All versions is affected

Workarounds

SWITCH EV did not respond to CISA's request for coordination. Contact SWITCH EV using their contact page here: https://swtchenergy.com/contact/ for more information.

Credits

  • Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA. finder

References

Problem Types

  • CWE-613 Insufficient Session Expiration CWE