ICSA-26-078-07
Vulnerability from csaf_cisa - Published: 2026-03-19 05:00 - Updated: 2026-03-19 05:00Summary
IGL-Technologies eParking.fi
Notes
Legal Notice and Terms of Use: This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).
Risk evaluation: Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.
Critical infrastructure sectors: Energy, Transportation Systems
Countries/areas deployed: Worldwide
Company headquarters location: Finland
Recommended Practices: CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:
Recommended Practices: Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.
Recommended Practices: Locate control system networks and remote devices behind firewalls and isolating them from business networks.
Recommended Practices: When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.
Recommended Practices: CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices: CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices: CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.
Recommended Practices: Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Recommended Practices: Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.
Recommended Practices: No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.
9.4 (Critical)
Mitigation
IGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:
Mitigation
1) Enforce modern security profiles and stronger authentication.
Mitigation
2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.
Mitigation
3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.
Mitigation
4) Enhanced automated monitoring and alerting to detection abnormal network activity.
Mitigation
Devices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.
Mitigation
To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals.
Mitigation
For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.
mailto:security@igl.fi
7.5 (High)
Mitigation
IGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:
Mitigation
1) Enforce modern security profiles and stronger authentication.
Mitigation
2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.
Mitigation
3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.
Mitigation
4) Enhanced automated monitoring and alerting to detection abnormal network activity.
Mitigation
Devices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.
Mitigation
To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals.
Mitigation
For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.
mailto:security@igl.fi
7.3 (High)
Mitigation
IGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:
Mitigation
1) Enforce modern security profiles and stronger authentication.
Mitigation
2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.
Mitigation
3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.
Mitigation
4) Enhanced automated monitoring and alerting to detection abnormal network activity.
Mitigation
Devices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.
Mitigation
To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals.
Mitigation
For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.
mailto:security@igl.fi
6.5 (Medium)
Mitigation
IGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:
Mitigation
1) Enforce modern security profiles and stronger authentication.
Mitigation
2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.
Mitigation
3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.
Mitigation
4) Enhanced automated monitoring and alerting to detection abnormal network activity.
Mitigation
Devices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.
Mitigation
To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals.
Mitigation
For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.
mailto:security@igl.fi
References
Acknowledgments
Khaled Sarieddine
Mohammad Ali Sayed
{
"document": {
"acknowledgments": [
{
"names": [
"Khaled Sarieddine",
"Mohammad Ali Sayed"
],
"summary": "reported these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://www.cisa.gov/news-events/news/traffic-light-protocol-tlp-definitions-and-usage"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy \u0026 Use policy (https://www.cisa.gov/privacy-policy).",
"title": "Legal Notice and Terms of Use"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Energy, Transportation Systems",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Finland",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-26-078-07 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2026/icsa-26-078-07.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-26-078-07 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-07"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-alerts/ics-alert-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/targeted-cyber-intrusion-detection-and-mitigation-strategies-update-b"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/secure-our-world/teach-employees-avoid-phishing"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/news/avoiding-social-engineering-and-phishing-attacks"
}
],
"title": "IGL-Technologies eParking.fi",
"tracking": {
"current_release_date": "2026-03-19T05:00:00.000000Z",
"generator": {
"date": "2026-03-18T19:25:06.292098Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-26-078-07",
"initial_release_date": "2026-03-19T05:00:00.000000Z",
"revision_history": [
{
"date": "2026-03-19T05:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "IGL-Technologies eParking.fi: vers:all/*",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "eParking.fi"
}
],
"category": "vendor",
"name": "IGL-Technologies"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-29796",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "summary",
"text": "WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:Y/2026-03-18T05:00:00.000000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/306.html"
},
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29796"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "IGL-Technologies has updated eParking\u0027s OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "1) Enforce modern security profiles and stronger authentication.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "2) Device\u2011level whitelisting was implemented to ensure that only authorized charging units can connect.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "3) Rate\u2011limiting controls prevent excessive requests and reduces DoS risk.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "4) Enhanced automated monitoring and alerting to detection abnormal network activity.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Devices using the encrypted deployment of eParking\u0027s OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO\u202f27001:2022 security program and tighten security requirements for future third\u2011party OCPP hardware approvals.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.",
"product_ids": [
"CSAFPID-0001"
],
"url": "mailto:security@igl.fi"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2026-31903",
"cwe": {
"id": "CWE-307",
"name": "Improper Restriction of Excessive Authentication Attempts"
},
"notes": [
{
"category": "summary",
"text": "The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:Y/2026-03-18T05:00:00.000000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/307.html"
},
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31903"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "IGL-Technologies has updated eParking\u0027s OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "1) Enforce modern security profiles and stronger authentication.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "2) Device\u2011level whitelisting was implemented to ensure that only authorized charging units can connect.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "3) Rate\u2011limiting controls prevent excessive requests and reduces DoS risk.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "4) Enhanced automated monitoring and alerting to detection abnormal network activity.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Devices using the encrypted deployment of eParking\u0027s OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO\u202f27001:2022 security program and tighten security requirements for future third\u2011party OCPP hardware approvals.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.",
"product_ids": [
"CSAFPID-0001"
],
"url": "mailto:security@igl.fi"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2026-32663",
"cwe": {
"id": "CWE-613",
"name": "Insufficient Session Expiration"
},
"notes": [
{
"category": "summary",
"text": "The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:Y/2026-03-18T05:00:00.000000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/613.html"
},
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32663"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "IGL-Technologies has updated eParking\u0027s OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "1) Enforce modern security profiles and stronger authentication.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "2) Device\u2011level whitelisting was implemented to ensure that only authorized charging units can connect.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "3) Rate\u2011limiting controls prevent excessive requests and reduces DoS risk.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "4) Enhanced automated monitoring and alerting to detection abnormal network activity.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Devices using the encrypted deployment of eParking\u0027s OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO\u202f27001:2022 security program and tighten security requirements for future third\u2011party OCPP hardware approvals.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.",
"product_ids": [
"CSAFPID-0001"
],
"url": "mailto:security@igl.fi"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2026-31926",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "summary",
"text": "Charging station authentication identifiers are publicly accessible via web-based mapping platforms.",
"title": "Vulnerability Summary"
},
{
"category": "details",
"text": "SSVCv2/E:N/A:Y/2026-03-18T05:00:00.000000Z",
"title": "SSVC"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "cwe.mitre.org",
"url": "https://cwe.mitre.org/data/definitions/522.html"
},
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31926"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "IGL-Technologies has updated eParking\u0027s OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "1) Enforce modern security profiles and stronger authentication.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "2) Device\u2011level whitelisting was implemented to ensure that only authorized charging units can connect.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "3) Rate\u2011limiting controls prevent excessive requests and reduces DoS risk.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "4) Enhanced automated monitoring and alerting to detection abnormal network activity.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "Devices using the encrypted deployment of eParking\u0027s OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "To prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO\u202f27001:2022 security program and tighten security requirements for future third\u2011party OCPP hardware approvals.",
"product_ids": [
"CSAFPID-0001"
]
},
{
"category": "mitigation",
"details": "For more information please contact the IGL-Technologies security team at this email address: security@igl.fi.",
"product_ids": [
"CSAFPID-0001"
],
"url": "mailto:security@igl.fi"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…