CVE-2026-27767
OCPP Implementations · OCPP WebSocket Endpoint
Unauthenticated attackers can perform station impersonation and manipulate backend data due to a lack of authentication on OCPP WebSocket endpoints.
Executive summary
The absence of authentication on OCPP WebSocket endpoints allows unauthenticated attackers to hijack charging station identities and manipulate backend infrastructure.
Vulnerability
This vulnerability stems from the lack of authentication mechanisms on WebSocket endpoints. Attackers can connect using a known charger ID and interact with the backend as a legitimate station without providing credentials.
Business impact
Attackers can gain unauthorized control over charging infrastructure and corrupt the data reported to the backend. This can lead to financial loss, privilege escalation, and significant reputational damage. The CVSS score of 9.4 underscores the critical risk to charging network operators.
Remediation
Immediate Action: Apply security updates to the OCPP backend to require authentication for all incoming WebSocket connections.
Proactive Monitoring: Audit backend logs for station IDs that connect from multiple locations or show unusual data patterns.
Compensating Controls: Deploy a secure proxy or gateway that requires authentication before forwarding traffic to the OCPP WebSocket endpoint.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Immediate action is required to secure the OCPP communication channel. Enforcing strong, per-device authentication is the only way to mitigate the risk of station impersonation and data corruption.