CVE-2026-25851
OCPP Implementations · OCPP WebSocket Endpoint
OCPP WebSocket endpoints lack authentication, allowing unauthenticated attackers to impersonate legitimate charging stations and issue unauthorized commands.
Executive summary
The failure to authenticate OCPP WebSocket connections allows attackers to impersonate charging stations and manipulate critical infrastructure data.
Vulnerability
An unauthenticated attacker can connect to an OCPP WebSocket endpoint using a discovered charging station ID. Without authentication, the backend accepts the attacker as a legitimate charger, allowing for full command issuance and reception.
Business impact
Successful exploitation leads to privilege escalation and unauthorized control over the charging network. This can result in the corruption of charging data, unauthorized free charging, or disruption of service. The CVSS score of 9.4 indicates a critical vulnerability that directly impacts the security of the energy distribution chain.
Remediation
Immediate Action: Enable and enforce authentication on the OCPP backend immediately, following the OCPP 1.6 or 2.0.1 security whitepapers.
Proactive Monitoring: Monitor for anomalous OCPP command sequences that deviate from standard charging station behavior.
Compensating Controls: Implement IP whitelisting for charging stations if they operate on static IP addresses or within a private APN.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Protecting charging infrastructure from unauthorized access is essential for maintaining public trust and operational stability. Immediate implementation of robust authentication for all WebSocket endpoints is required.