Impact
EVerest core versions up to and including 2025.12.1 allow a bypass of sequence state verification, including authentication checks, which means an attacker can send ISO 15118‑2 messages that transition the EVSE Manager to forbidden states. The vulnerability permits the internal context to be updated with illegitimate data, potentially allowing a vehicle to be charged without proper authentication or authorization.
Affected Systems
The issue affects the EVerest:everest‑core component, specifically any installations using versions 2025.12.1 or earlier. No published patch exists at the time of release; users should ensure their deployments do not run these versions.
Risk and Exploitability
The CVSS v3.1 score is 4.3, indicating moderate severity, and the EPSS score is less than 1 %, showing a very low historical exploitation probability. It is not currently listed in the CISA KEV catalog. Exploitation would require an attacker to craft ISO 15118‑2 messages that are published to the system’s MQTT broker; with those messages, the EVSE can be tricked into a charging state that would normally be unreachable in the ‘WaitingForAuthentication’ state. Given the lack of a patch, the risk remains primarily to users running vulnerable versions.
OpenCVE Enrichment