<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Electric-Vehicle — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/electric-vehicle/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Feb 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/electric-vehicle/feed.xml" rel="self" type="application/rss+xml"/><item><title>Multiple Vulnerabilities in SWITCH EV Charging Stations</title><link>https://feed.craftedsignal.io/briefs/2026-02-switch-ev-vulns/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-switch-ev-vulns/</guid><description>Multiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.</description><content:encoded><![CDATA[<p>SWITCH EV&rsquo;s swtchenergy.com charging stations are affected by multiple vulnerabilities that could allow attackers to gain unauthorized access and disrupt services. These vulnerabilities include missing authentication mechanisms, lack of rate limiting on authentication requests, predictable session identifiers, and publicly accessible authentication identifiers. Successful exploitation could lead to station impersonation, session hijacking, denial-of-service attacks, and manipulation of backend data. The affected product is swtchenergy.com versions all/* . The vendor did not respond to CISA&rsquo;s request for coordination. The charging stations are deployed worldwide in the energy and transportation sectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a charging station ID via public mapping platforms (CVE-2026-27773).</li>
<li>Attacker connects to the OCPP WebSocket endpoint of the charging station using the discovered ID (CVE-2026-27767).</li>
<li>Because no authentication is required, the attacker impersonates the charging station.</li>
<li>Attacker sends malicious commands to the backend, potentially manipulating charging parameters or data (CVE-2026-27767).</li>
<li>Alternatively, the attacker floods the authentication endpoint with requests, causing a denial-of-service condition by overwhelming the backend (CVE-2026-25113).</li>
<li>Attacker hijacks a legitimate session by establishing a new connection using the same session identifier (CVE-2026-25778).</li>
<li>The legitimate charging station is disconnected, and the attacker receives backend commands intended for the legitimate station.</li>
<li>Attacker manipulates charging station behavior or data, causing disruption or financial loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences. Attackers could impersonate charging stations, hijack sessions, suppress or misroute traffic to cause large-scale denial-of-service attacks, and manipulate data sent to the backend. This could lead to widespread disruption of EV charging services, financial losses for charging station operators and users, and potential damage to the electrical grid. Given the global deployment of these charging stations in the energy and transportation sectors, the impact could be widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections to OCPP WebSocket endpoints for connections without proper authentication to detect potential station impersonation attempts related to CVE-2026-27767.</li>
<li>Implement rate limiting on authentication requests to the WebSocket API to mitigate denial-of-service attacks as described in CVE-2026-25113.</li>
<li>Monitor for multiple connections using the same session identifier to detect potential session hijacking attempts related to CVE-2026-25778.</li>
<li>Monitor for access to swtchenergy.com from unusual or unexpected geolocations.</li>
<li>Consult SWITCH EV (swtchenergy.com) for potential mitigations or workarounds, as they did not respond to CISA&rsquo;s request for coordination.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>electric-vehicle</category><category>charging-station</category><category>websocket</category></item></channel></rss>