Description
EVerest is an EV charging software stack. Prior to version 2026.02.0, even immediately after CSMS performs a RemoteStop (StopTransaction), the EVSE can return to `PrepareCharging` via the EV's BCB toggle, allowing session restart. This breaks the irreversibility of remote stop and can bypass operational/billing/safety controls. Version 2026.02.0 contains a patch.
Published: 2026-03-26
Score: 5.2 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote stop irreversibility bypass
Action: Apply Patch
AI Analysis

Impact

The flaw exists in the EV charging software stack EVerest. A RemoteStop operation issued by a CSMS should permanently terminate a charging session. However, before version 2026.02.0, an EVSE can trigger a BCB toggle immediately after the stop, causing the system to transition back to PrepareCharging. This action forcibly restarts the session, effectively bypassing the intended security, billing, and safety controls. The outcome is that a charging session can be resumed even after a remote stop, undermining transaction integrity.

Affected Systems

This problem affects the EVerest core software stack, used in electric vehicle charging stations. The issue is present in releases older than version 2026.02.0; any deployment of the 2026.01.x or earlier series is vulnerable. The software is distributed by the Linux Foundation under the EVerest project.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.2, indicating a moderate risk level. With an EPSS score under 1 %, exploitation is unlikely to be widespread at present, and it is not known to be featured in the CISA KEV catalog. Exploitation requires the ability to toggle the BCB on the EVSE immediately after a RemoteStop has been issued; the analysis infers this to be a local or device‑side action rather than a remote network exploit. Because it forces the session back into the charging state, a user or attacker who can control the EVSE could resume billing. Yet, to trigger the flaw an attacker must already have physical or local access to the charging equipment, a condition that limits the overall attack reach. The severity remains moderate, but any deployment operating with earlier releases should be patched to eliminate the ability to restart a terminated session.

Generated by OpenCVE AI on March 31, 2026 at 15:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the EVerest software to version 2026.02.0 or later.
  • Verify that all charging stations are running the patched version.
  • Monitor charging logs for unexpected session restarts or billing anomalies.

Generated by OpenCVE AI on March 31, 2026 at 15:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation everest
CPEs cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*
Vendors & Products Linuxfoundation
Linuxfoundation everest

Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Everest
Everest everest-core
Vendors & Products Everest
Everest everest-core

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description EVerest is an EV charging software stack. Prior to version 2026.02.0, even immediately after CSMS performs a RemoteStop (StopTransaction), the EVSE can return to `PrepareCharging` via the EV's BCB toggle, allowing session restart. This breaks the irreversibility of remote stop and can bypass operational/billing/safety controls. Version 2026.02.0 contains a patch.
Title EVerest has RemoteStop Bypass via BCB Toggle Session Restart
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.2, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Everest Everest-core
Linuxfoundation Everest
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-26T17:35:07.268Z

Reserved: 2026-03-17T17:22:14.666Z

Link: CVE-2026-33015

cve-icon Vulnrichment

Updated: 2026-03-26T17:34:59.421Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T17:16:38.130

Modified: 2026-03-31T14:20:51.050

Link: CVE-2026-33015

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:08:46Z

Weaknesses