Impact
The vulnerability allows an attacker to connect to the OCPP WebSocket endpoint without authentication and impersonate any charging station, issuing or receiving commands that the backend processes as legitimate. This can lead to integrity compromise of charging data, unauthorized control of charging infrastructure, and potential denial of service to legitimate users, and aligns with CWE-306.
Affected Systems
Mobility46’s mobility46.se platform, covering all documented versions, is affected; no specific version range was disclosed, so all deployments are considered at risk.
Risk and Exploitability
With a CVSS base score of 9.3 the risk is critical, while the EPSS is less than 1%, indicating a low current exploitation probability; the vulnerability is not yet in the KEV catalog. Attackers can exploit the exposed WebSocket endpoint by connecting with any network and using a known or guessable charging station identifier, requiring no special privileges or pre‑access – the exploit path is straightforward on an unauthenticated interface.
OpenCVE Enrichment