WebSocket endpoints unauthenticated access
CVE-2026-20781
Attackers can hijack WebSocket connections without authentication, allowing data theft and command execution. Update to the latest patched version immed...
Patch now - CVE-2026-20781 is a critical authentication bypass in OCPP WebSocket endpoints used by electric vehicle charging networks that grants attackers unauthenticated impersonation of any charging station, enabling remote control, data corruption, and network compromise. Apply vendor patches immediately.
Overview
A critical security flaw has been identified in the implementation of WebSocket endpoints used for OCPP (Open Charge Point Protocol) communications. This vulnerability allows an attacker to impersonate any charging station on the network without providing any credentials, leading to unauthorized access and control.
Vulnerability Explained
In simple terms, the system designed to communicate with electric vehicle chargers is missing a critical verification step. It uses WebSocket connections-a persistent communication channel-but does not properly check who is connecting.
An attacker can connect to this communication port using a charging station’s identifier, which may be easy to guess or discover. Once connected, the system treats the attacker as a legitimate, trusted charger. This allows the attacker to send false data to the central management system or issue malicious commands directly to the backend as if they were a real station.
Potential Impact
The consequences of this vulnerability are severe, warranting its CRITICAL severity rating (CVSS: 9.4).
- Unauthorized Control: Attackers could remotely start or stop charging sessions, manipulate pricing, or disable charging stations.
- Data Corruption: False operational data, usage statistics, and error reports could be sent to the backend, disrupting billing, maintenance, and grid management.
- Privilege Escalation: By impersonating a station, an attacker gains a trusted position within the network, which could be used as a foothold for further attacks on the central management system.
- Infrastructure Disruption: Widespread manipulation could lead to service outages, financial loss, and damage to the reliability of the charging network.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation: The definitive solution is to implement robust authentication for all WebSocket connections to the OCPP backend. This should involve:
- Requiring a unique, cryptographically strong secret (like a token or certificate) from each charging station during the connection handshake.
- Ensuring the backend validates this credential before accepting any commands or data.
Immediate Mitigations: If a permanent fix cannot be applied immediately, consider these steps to reduce risk:
- Network Segmentation: Isolate the OCPP backend and charging station network segments from other corporate networks and the public internet. Restrict access using firewalls to only allow connections from known, legitimate station IP addresses where possible.
- Intrusion Detection: Implement network monitoring to detect anomalous connection patterns or commands originating from unexpected sources.
- Identifier Obfuscation: Avoid using easily guessable or sequential charging station identifiers. However, this is a weak mitigation and should not be relied upon alone.
System administrators should contact their OCPP backend software or charging station management system vendor for a patched version that includes proper WebSocket authentication.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers ...
OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Atta...
Vvveb before version 1.0.8.2 contains a hard-coded credentials vulnerability in its docker-compose-apache.yaml configuration that allows unauthenticated attackers to access the bundled phpMyAdmin cont...
Arelle before 2.39.10 contains an unauthenticated remote code execution vulnerability in the /rest/configure REST endpoint that accepts a plugins query parameter and forwards it to the plugin manager ...