CVE-2026-25851

OCPP Implementations · OCPP WebSocket Endpoint

OCPP WebSocket endpoints lack authentication, allowing unauthenticated attackers to impersonate legitimate charging stations and issue unauthorized commands.

Executive summary

The failure to authenticate OCPP WebSocket connections allows attackers to impersonate charging stations and manipulate critical infrastructure data.

Vulnerability

An unauthenticated attacker can connect to an OCPP WebSocket endpoint using a discovered charging station ID. Without authentication, the backend accepts the attacker as a legitimate charger, allowing for full command issuance and reception.

Business impact

Successful exploitation leads to privilege escalation and unauthorized control over the charging network. This can result in the corruption of charging data, unauthorized free charging, or disruption of service. The CVSS score of 9.4 indicates a critical vulnerability that directly impacts the security of the energy distribution chain.

Remediation

Immediate Action: Enable and enforce authentication on the OCPP backend immediately, following the OCPP 1.6 or 2.0.1 security whitepapers.

Proactive Monitoring: Monitor for anomalous OCPP command sequences that deviate from standard charging station behavior.

Compensating Controls: Implement IP whitelisting for charging stations if they operate on static IP addresses or within a private APN.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Protecting charging infrastructure from unauthorized access is essential for maintaining public trust and operational stability. Immediate implementation of robust authentication for all WebSocket endpoints is required.