Impact
The WebSocket backend of CloudCharge's cloudcharge.se platform uses charging station identifiers as session tokens but fails to invalidate or randomize them, so session identifiers are predictable. This design permits attackers to hijack or shadow existing sessions, authenticating as other charging stations and receiving backend commands intended for those stations. The flaw can also be used to cause denial of service by sending a flood of legitimate session requests that overwhelm the backend.
Affected Systems
The vulnerability affects CloudCharge's cloudcharge.se application. No specific product versions are listed, implying that all releases may be susceptible until the vendor releases a fix.
Risk and Exploitability
The CVSS v3 score of 6.9 denotes moderate severity, while an EPSS score below 1% indicates exploitation likelihood is low at present. The vulnerability is not yet in the CISA KEV catalog. Attackers could exploit it remotely by establishing WebSocket connections with crafted session identifiers, requiring network visibility to the backend. If exploited successfully, attackers can execute commands on behalf of hijacked stations or overload the backend, disrupting service availability.
OpenCVE Enrichment