CVSS 9.4 Flaw Lets Attackers Hijack EV Charging Stations
CVE-2026-20781 exposes OCPP WebSocket endpoints to unauthenticated station impersonation, enabling attackers to manipulate EV charging infrastructure and steal energy.
A critical authentication bypass in the Open Charge Point Protocol (OCPP) allows attackers to impersonate EV charging stations and manipulate charging network infrastructure. CVE-2026-20781 was published February 27, 2026, with a CVSS score of 9.4.
The vulnerability affects OCPP WebSocket endpoints that lack authentication mechanisms, enabling unauthenticated attackers to connect and issue commands as if they were legitimate charging stations. No patch exists at time of publication—organizations must implement network-level mitigations.
How the Attack Works
OCPP is the standard communication protocol between EV charging stations and central management systems. Charging stations connect to backend systems via WebSocket to report status, authenticate users, process payments, and receive configuration updates.
CVE-2026-20781 exploits a fundamental design flaw: some OCPP implementations don't authenticate WebSocket connections. An attacker who can reach the WebSocket endpoint needs only a valid station identifier—often predictable or discoverable—to:
- Connect to the management system posing as a legitimate station
- Report false telemetry data (fake charging sessions, manipulated energy usage)
- Receive commands intended for the real station
- Potentially initiate or terminate charging sessions
The attack requires no credentials. Network access to the OCPP endpoint and knowledge of a station identifier are sufficient.
Who's Affected
The CloudCharge platform is confirmed vulnerable, though the flaw likely affects other OCPP implementations lacking endpoint authentication. Organizations operating charging networks should audit their deployments regardless of vendor.
Affected parties include:
- Utility companies operating public charging networks
- Fleet operators managing corporate or municipal EV infrastructure
- Property owners with charging stations in parking facilities
- Municipalities running public charging programs
The attack surface is significant. Public charging stations often expose their management interfaces to the internet for remote monitoring and maintenance.
Real-World Impact
Successful exploitation enables several attack scenarios:
Energy theft: Attackers could impersonate stations to falsify charging records, enabling free energy consumption or billing fraud.
Infrastructure disruption: Manipulated status data could trigger false alarms, automatic shutdowns, or prevent legitimate users from charging. This echoes concerns raised about critical infrastructure targeting in utility sectors.
Data corruption: Backend systems relying on station-reported data for billing, capacity planning, and maintenance would operate on poisoned information.
Lateral movement: Compromised management systems could serve as pivot points into broader IT infrastructure, particularly concerning given the persistent access techniques attackers have demonstrated against network infrastructure.
Immediate Mitigations
With no vendor patch available, organizations should implement defense-in-depth:
- Restrict WebSocket access to known IP ranges and authenticated network segments
- Deploy Web Application Firewalls with rules to detect unauthorized WebSocket connections
- Implement mutual TLS between stations and management systems
- Monitor for anomalous connection patterns, particularly connections from unexpected IP addresses or duplicate station identifiers
- Audit station identifiers for predictable patterns that could be enumerated
Longer-term, pressure vendors to implement proper authentication on OCPP endpoints. The protocol itself supports authentication—this vulnerability exists in implementations that skip it for convenience.
Why This Matters
EV charging infrastructure is critical infrastructure. As electric vehicle adoption accelerates, these networks become more attractive targets for disruption, whether by nation-state actors seeking to destabilize energy systems or criminals looking for fraud opportunities.
CVE-2026-20781 demonstrates a recurring IoT security pattern: protocols designed for trusted environments being deployed on untrusted networks without adding authentication. We've seen this movie before with industrial control systems, and the consequences for ICS/SCADA security continue to unfold.
Organizations operating EV charging infrastructure should treat this disclosure as a wake-up call. Audit your OCPP deployments now, before attackers do it for you.
Related Articles
Grandstream VoIP Phones Vulnerable to Silent Eavesdropping
CVE-2026-2329 (CVSS 9.3) enables unauthenticated RCE on Grandstream GXP1600 VoIP phones. Attackers can intercept calls, steal credentials. Patch to 1.0.7.81.
Feb 19, 2026CISA Releases 10 ICS Advisories for Siemens, Schneider, Others
Industrial control system vulnerabilities disclosed in Siemens RUGGEDCOM, Industrial Edge devices, Schneider EcoStruxure, AVEVA, and Festo products.
Jan 18, 2026Vikunja Auth Flaw Lets Attackers Maintain Access After Password Reset
CVE-2026-27575 combines weak password enforcement with persistent sessions in Vikunja, enabling attackers to retain access even after victims change credentials.
Feb 27, 2026Xerox FreeFlow Core RCE Flaw Lets Attackers Hijack Print Servers
CVE-2026-2251 is a CVSS 9.8 path traversal vulnerability in Xerox FreeFlow Core that enables unauthenticated remote code execution. Upgrade to version 8.1.0 now.
Feb 27, 2026