Description
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and unplugging/SessionFinished status. Version 2026.02.0 patches the issue.
Published: 2026-03-26
Score: 4.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Race condition causing std::map corruption which can lead to application crashes and service instability
Action: Patch Upgrade
AI Analysis

Impact

EVerest 1.6 and earlier versions contain a concurrency flaw where simultaneous updates to the EV state‑of‑charge (SoC) map and power‑meter readings lead to corruption of a std::map holding optional entries. The defect is a classic data‑race (CWE‑362) that may cause the map to become inconsistent, potentially resulting in application crashes, unpredictable behavior, or denial of service of the charging station software. No direct exploitation path is described in the source, but the inconsistency can crash the server or drop charging sessions.

Affected Systems

The vulnerable component is the everest-core stack of EVerest, the open‑source electric‑vehicle charging software. All releases before version 2026.02.0 are affected; version 2026.02.0 includes the fix.

Risk and Exploitability

The CVSS score of 4.2 indicates moderate severity, and the EPSS score is below 1 %, suggesting a low estimated exploitation probability. The vulnerability is not listed in the CISA KEV catalog, reinforcing the low threat level. The likely attack vector is local access or an attacker that can induce concurrent SoC updates from the vehicle and periodic power‑meter updates while the vehicle is unplugged or the session is finished. Inferences indicate that an attacker would need direct or privileged interaction with the EVSE to trigger the race, making remote exploitation unlikely under normal conditions.

Generated by OpenCVE AI on March 31, 2026 at 14:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade EVerest to version 2026.02.0 or later to apply the vendor patch.
  • If an upgrade is not immediately possible, suspend power‑meter updates or SoC updates during session transitions such as unplugging or SessionFinished to avoid concurrent access.
  • Disable or throttle EV SoC update requests from the vehicle while the power meter is active until the issue is resolved.
  • Continuously monitor EVSE logs for crashes or abnormal exceptions related to map operations and apply the patch as soon as possible.

Generated by OpenCVE AI on March 31, 2026 at 14:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation everest
CPEs cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation everest

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Everest
Everest everest-core
Vendors & Products Everest
Everest everest-core

Thu, 26 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and unplugging/SessionFinished status. Version 2026.02.0 patches the issue.
Title EVerest has race-condition-induced std::map corruption in OCPP 1.6 evse_soc_map
Weaknesses CWE-362
References
Metrics cvssV3_1

{'score': 4.2, 'vector': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Everest Everest-core
Linuxfoundation Everest
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T18:48:59.324Z

Reserved: 2026-02-10T18:01:31.901Z

Link: CVE-2026-26072

cve-icon Vulnrichment

Updated: 2026-03-26T18:48:55.398Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T15:16:33.010

Modified: 2026-03-31T13:06:06.817

Link: CVE-2026-26072

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:08:58Z

Weaknesses