As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cds.thalesgroup.com/en |
|
History
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
|
| Vendors & Products |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
Wed, 07 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6. | |
| Title | INFORMATION DISCLOSURE VIA CURL REQUESTS (OCPP) | |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2026-01-07T17:12:01.065Z
Reserved: 2026-01-07T14:01:04.828Z
Link: CVE-2026-22539
No data.
Status : Awaiting Analysis
Published: 2026-01-07T18:15:55.537
Modified: 2026-01-08T18:08:54.147
Link: CVE-2026-22539
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:48:05Z
Weaknesses