<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Websocket — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/websocket/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 03 May 2026 17:16:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/websocket/feed.xml" rel="self" type="application/rss+xml"/><item><title>AV Stumpfl Pixera Two Media Server Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</link><pubDate>Sun, 03 May 2026 17:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pixera-code-injection/</guid><description>A remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.</description><content:encoded><![CDATA[<p>A code injection vulnerability, tracked as CVE-2026-7703, has been identified in AV Stumpfl Pixera Two Media Server impacting versions up to 25.2 R2. The vulnerability resides within an unspecified function of the Websocket API component. Successful exploitation allows a remote attacker to inject and execute arbitrary code on the affected system. Given that an exploit has been published, the risk of exploitation is elevated. Organizations using the Pixera Two Media Server should upgrade to version 25.2 R3 or later to mitigate the risk. This vulnerability poses a significant threat to media production environments relying on the affected software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable AV Stumpfl Pixera Two Media Server instance running a version prior to 25.2 R3.</li>
<li>The attacker crafts a malicious payload designed to exploit the code injection vulnerability within the Websocket API.</li>
<li>The attacker sends the malicious payload to the Pixera Two Media Server instance via a Websocket connection.</li>
<li>The vulnerable function within the Websocket API fails to properly sanitize or validate the input.</li>
<li>The malicious payload is processed, resulting in the injection of attacker-controlled code into the server&rsquo;s process.</li>
<li>The injected code executes with the privileges of the Pixera Two Media Server process.</li>
<li>The attacker gains arbitrary code execution on the server, potentially leading to complete system compromise.</li>
<li>The attacker can then install malware, exfiltrate sensitive data, or disrupt media server operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7703 can result in arbitrary code execution on the AV Stumpfl Pixera Two Media Server. This could allow an attacker to gain complete control over the server, potentially disrupting media presentations, stealing sensitive data, or using the compromised server as a launchpad for further attacks within the network. The impact is significant due to the critical role media servers play in various entertainment and presentation environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade AV Stumpfl Pixera Two Media Server to version 25.2 R3 or later to patch CVE-2026-7703 (reference: AV Stumpfl advisory).</li>
<li>Monitor network traffic for suspicious Websocket connections originating from or targeting AV Stumpfl Pixera Two Media Servers using the &ldquo;Detect Suspicious Pixera Websocket Activity&rdquo; Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise of the Pixera Two Media Server.</li>
<li>Review and harden the configuration of the Pixera Two Media Server to minimize the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>code-injection</category><category>websocket</category><category>cve-2026-7703</category></item><item><title>OpenClaw Unauthenticated WebSocket Denial-of-Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-dos/</link><pubDate>Tue, 28 Apr 2026 19:37:43 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-dos/</guid><description>OpenClaw before 2026.3.28 is vulnerable to a denial-of-service attack by accepting unbounded concurrent unauthenticated WebSocket upgrades, allowing attackers to exhaust server resources.</description><content:encoded><![CDATA[<p>OpenClaw, in versions prior to 2026.3.28, suffers from a denial-of-service vulnerability due to a lack of pre-authentication budget allocation for WebSocket upgrades. This flaw allows unauthenticated network attackers to initiate a large number of concurrent WebSocket upgrade requests without any resource constraints. By exploiting this, an attacker can exhaust the server&rsquo;s socket and worker capacity, effectively preventing legitimate clients from establishing WebSocket connections and disrupting normal service operation. This vulnerability poses a risk to any OpenClaw deployment accessible over a network, as it can be exploited without requiring any prior authentication or privileged access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies an OpenClaw server accessible over the network.</li>
<li>The attacker sends a large number of WebSocket upgrade requests to the server. These requests are crafted to initiate the WebSocket handshake process.</li>
<li>The OpenClaw server accepts these requests without pre-authentication checks or resource limits.</li>
<li>Each incoming WebSocket upgrade request consumes server resources, including sockets and worker threads.</li>
<li>The attacker continues to flood the server with upgrade requests, rapidly exhausting available resources.</li>
<li>As resources become scarce, the server&rsquo;s ability to handle legitimate client requests degrades.</li>
<li>Eventually, the server&rsquo;s socket and worker capacity is fully exhausted, leading to a denial-of-service condition.</li>
<li>Legitimate clients are unable to establish WebSocket connections, disrupting application functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, preventing legitimate users from accessing OpenClaw services. The number of affected users depends on the scale of the OpenClaw deployment and the number of concurrent users it typically supports. Organizations relying on OpenClaw for critical functions could experience significant disruptions and potential data loss if the service becomes unavailable. The vulnerability allows a single attacker to disrupt the service without requiring any credentials or prior access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.28 or later to remediate the vulnerability (CVE-2026-41399).</li>
<li>Implement rate limiting on WebSocket upgrade requests to mitigate the impact of malicious requests. Deploy the Sigma rule <code>Detect Excessive WebSocket Upgrade Requests</code> to identify suspicious activity.</li>
<li>Monitor network traffic for a high volume of WebSocket upgrade requests originating from a single source IP address. Use the Sigma rule <code>Detect High Volume of WebSocket Upgrade Requests from Single IP</code> to detect this pattern.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>websocket</category><category>cve</category></item><item><title>PraisonAI Unauthenticated Remote Session Hijacking Vulnerability (CVE-2026-40289)</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-rce/</link><pubDate>Tue, 14 Apr 2026 04:18:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-rce/</guid><description>PraisonAI versions before 4.5.139 and praisonaiagents versions before 1.5.140 are vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on the /ws WebSocket endpoint, enabling unauthorized remote control and data leakage.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent team system, is affected by a critical vulnerability (CVE-2026-40289) in versions prior to 4.5.139 and praisonaiagents versions prior to 1.5.140. The vulnerability lies in the browser bridge component (&ldquo;praisonai browser start&rdquo;), which lacks proper authentication and has a bypassable origin check on its /ws WebSocket endpoint. The server, binding to 0.0.0.0 by default, inadequately validates the Origin header, permitting connections from non-browser clients omitting this header. This flaw allows an unauthenticated attacker to remotely hijack sessions and broadcast automation actions and outputs. This can lead to unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions. Defenders must prioritize patching affected systems to mitigate this severe risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PraisonAI instance with network access to the browser bridge component.</li>
<li>Attacker establishes a direct WebSocket connection to the /ws endpoint of the browser bridge, omitting the Origin header to bypass the weak origin check.</li>
<li>Attacker sends a &ldquo;start_session&rdquo; message to the WebSocket endpoint.</li>
<li>The server routes the attacker&rsquo;s &ldquo;start_session&rdquo; request to the first idle browser-extension WebSocket, effectively hijacking that session.</li>
<li>The hijacked browser session begins executing commands dictated by the attacker.</li>
<li>All automation actions and outputs resulting from the hijacked session are broadcast back to the attacker via the WebSocket connection.</li>
<li>Attacker gains unauthorized remote control of the connected browser automation session.</li>
<li>Attacker exfiltrates sensitive data and/or misuses model-backed browser actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40289 can lead to complete compromise of PraisonAI browser automation sessions. An attacker can gain unauthorized remote control, potentially leading to leakage of sensitive page context and automation results. Furthermore, they can misuse model-backed browser actions. The vulnerability affects all environments where the bridge is network-reachable. The severity of the impact is high, as it allows for unauthenticated remote code execution within the context of the PraisonAI browser extension.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI to version 4.5.139 or later, and praisonaiagents to version 1.5.140 or later to patch CVE-2026-40289.</li>
<li>Monitor network connections to the /ws endpoint on PraisonAI servers (logsource category: network_connection, product: windows/linux).</li>
<li>Deploy the Sigma rule to detect suspicious websocket connections without origin header (see rule below).</li>
<li>Implement network segmentation to limit network access to the PraisonAI browser bridge component.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-40289</category><category>websocket</category><category>remote-code-execution</category><category>praisonai</category></item><item><title>PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</link><pubDate>Thu, 09 Apr 2026 22:16:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-websocket-vuln/</guid><description>PraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.</description><content:encoded><![CDATA[<p>PraisonAI, a multi-agent teams system, contains a vulnerability in versions prior to 4.5.128 that exposes the <code>/media-stream</code> WebSocket endpoint in its call module. This endpoint lacks authentication or Twilio signature validation, allowing any client to establish a connection. Each successful connection initiates an authenticated session to OpenAI&rsquo;s Realtime API, utilizing the server&rsquo;s API key. Due to the absence of rate limits, connection limits, or message size restrictions, a malicious actor can exploit this vulnerability by creating numerous concurrent connections. This can lead to the exhaustion of server resources and a significant drain on the victim&rsquo;s OpenAI API credits. This vulnerability is addressed and patched in version 4.5.128.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PraisonAI instance running a vulnerable version (prior to 4.5.128).</li>
<li>Attacker establishes a WebSocket connection to the <code>/media-stream</code> endpoint of the PraisonAI instance without providing any authentication credentials.</li>
<li>The PraisonAI server, upon receiving the unauthenticated WebSocket connection, creates an authenticated session with the OpenAI Realtime API using its own API key.</li>
<li>Attacker sends a large volume of messages through the WebSocket connection, exploiting the lack of message rate limits.</li>
<li>Attacker initiates multiple concurrent WebSocket connections to the <code>/media-stream</code> endpoint.</li>
<li>The PraisonAI server becomes overloaded due to the excessive number of connections and message processing demands.</li>
<li>The victim&rsquo;s OpenAI API credits are rapidly depleted as the PraisonAI server processes requests from the attacker&rsquo;s connections.</li>
<li>The PraisonAI server experiences degraded performance or becomes completely unresponsive, impacting legitimate users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in resource exhaustion on the PraisonAI server, potentially causing denial of service for legitimate users. Furthermore, it leads to the unauthorized consumption of the victim&rsquo;s OpenAI API credits, resulting in unexpected charges and potential disruption of services reliant on the OpenAI API. The number of affected organizations depends on the prevalence of vulnerable PraisonAI instances deployed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PraisonAI installations to version 4.5.128 or later to patch CVE-2026-40116.</li>
<li>Implement rate limiting on WebSocket connections to the <code>/media-stream</code> endpoint to mitigate resource exhaustion.</li>
<li>Monitor OpenAI API usage for unexpected spikes in activity that may indicate exploitation of this vulnerability.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousPraisonAIWebSocketConnections</code> to identify potential exploitation attempts by detecting a high number of connections to the <code>/media-stream</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-40116</category><category>resource-exhaustion</category><category>websocket</category><category>api-abuse</category><category>cloud</category></item><item><title>Mesop Framework WebSocket Denial-of-Service Vulnerability (CVE-2026-34824)</title><link>https://feed.craftedsignal.io/briefs/2026-04-mesop-dos/</link><pubDate>Sat, 04 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mesop-dos/</guid><description>An unauthenticated attacker can exploit an uncontrolled resource consumption vulnerability in Mesop versions 1.2.3 to 1.2.4 by sending a rapid succession of WebSocket messages, leading to thread exhaustion and a denial-of-service condition.</description><content:encoded><![CDATA[<p>Mesop, a Python-based UI framework, is vulnerable to a denial-of-service (DoS) attack due to uncontrolled resource consumption in its WebSocket implementation. Specifically, versions 1.2.3 and 1.2.4 are affected. An unauthenticated attacker can exploit this vulnerability (CVE-2026-34824) by sending a rapid succession of WebSocket messages. The server, in turn, spawns an unbounded number of operating system threads to handle these messages. This leads to thread exhaustion and Out of Memory (OOM) errors, effectively crashing the Mesop application and causing a complete DoS. The vulnerability was patched in version 1.2.5, so upgrading is the primary mitigation. This DoS can impact any application built on the vulnerable versions of the framework.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Mesop application running a vulnerable version (1.2.3 or 1.2.4).</li>
<li>The attacker establishes a WebSocket connection to the Mesop application server.</li>
<li>The attacker crafts and sends a high volume of WebSocket messages to the server.</li>
<li>The server attempts to process each message by spawning a new OS thread.</li>
<li>The rapid influx of messages causes the server to spawn threads at an unsustainable rate.</li>
<li>The server&rsquo;s thread pool becomes exhausted, preventing it from servicing legitimate requests.</li>
<li>The server&rsquo;s memory usage increases dramatically as it attempts to manage the excessive threads.</li>
<li>The server runs out of memory (OOM) and crashes, resulting in a denial-of-service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-34824 results in a complete denial-of-service for applications built on the Mesop framework. This can lead to downtime, loss of productivity, and potential reputational damage. The impact is particularly severe for critical applications that rely on the Mesop framework for availability. While specific victim numbers are unavailable, any organization using Mesop versions 1.2.3 or 1.2.4 is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Mesop to version 1.2.5 or later to patch CVE-2026-34824.</li>
<li>Implement rate limiting on WebSocket connections to mitigate rapid message flooding.</li>
<li>Deploy the Sigma rule <code>Detect Mesop Excessive WebSocket Connections</code> to identify potential exploitation attempts based on network connection patterns.</li>
<li>Monitor server resource utilization (CPU, memory, threads) for Mesop applications and alert on unusual spikes to proactively identify potential DoS conditions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>denial-of-service</category><category>websocket</category><category>cve-2026-34824</category></item><item><title>PraisonAI Gateway Unauthenticated Access Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-praisonai-auth-bypass/</link><pubDate>Fri, 03 Apr 2026 23:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-praisonai-auth-bypass/</guid><description>PraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.</description><content:encoded><![CDATA[<p>CVE-2026-34952 exposes a critical vulnerability in PraisonAI, a multi-agent teams system. Specifically, versions of the PraisonAI Gateway server prior to 4.5.97 lack authentication for WebSocket connections at the <code>/ws</code> endpoint and for serving agent topology information at the <code>/info</code> endpoint. This absence of authentication means that any client on the network can connect to these endpoints. Attackers could exploit this vulnerability to enumerate registered agents, send arbitrary messages to agents and their associated tool sets, and potentially gain unauthorized control over the PraisonAI system. The vulnerability was reported on April 3, 2026, and is addressed in version 4.5.97 of PraisonAI.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable PraisonAI Gateway server running a version prior to 4.5.97.</li>
<li>The attacker establishes a WebSocket connection to the <code>/ws</code> endpoint of the server without providing any credentials.</li>
<li>The server, lacking authentication, accepts the connection.</li>
<li>The attacker sends a request to the <code>/info</code> endpoint to enumerate registered agents and their topology.</li>
<li>The server responds with the agent topology data.</li>
<li>The attacker crafts arbitrary messages and sends them to specific agents through the established WebSocket connection.</li>
<li>The targeted agent receives the message and executes the corresponding actions, potentially including tool usage or data modification.</li>
<li>The attacker achieves unauthorized control over the PraisonAI system by manipulating agents and their tool sets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could lead to complete compromise of the PraisonAI system. Attackers can enumerate and control agents, manipulate data, and potentially use the agents&rsquo; tool sets for malicious purposes, such as data theft or system disruption. This could impact organizations relying on PraisonAI for critical functions, leading to financial losses, reputational damage, and operational downtime. The severity is high due to the ease of exploitation and the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade all PraisonAI Gateway servers to version 4.5.97 or later to patch CVE-2026-34952.</li>
<li>Deploy the Sigma rules provided to detect unauthorized connections to the <code>/ws</code> and <code>/info</code> endpoints.</li>
<li>Monitor network traffic for suspicious WebSocket connections to the PraisonAI Gateway server to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>authentication bypass</category><category>websocket</category></item><item><title>NATS Server WebSocket Frame Length Overflow Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-03-nats-websocket-dos/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-nats-websocket-dos/</guid><description>A vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in NATS server versions 2.2.0 through 2.11.13 and 2.12.0 through 2.12.4, enabling unauthenticated remote attackers to trigger a denial-of-service (DoS) condition. The vulnerability stems from a missing sanity check on WebSocket frame lengths, allowing malicious clients to send crafted frames that cause a server panic and crash. This issue impacts deployments that utilize WebSockets and expose the network port to untrusted endpoints. The attack requires no authentication or credentials and can be executed with a single TCP connection sending a malicious WebSocket frame. This vulnerability was reported by GitHub users Mistz1 and jiayuqi7813.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes a TCP connection to the NATS server&rsquo;s WebSocket port.</li>
<li>The attacker sends a WebSocket upgrade request to initiate the WebSocket handshake.</li>
<li>The NATS server completes the WebSocket handshake, establishing a WebSocket connection.</li>
<li>The attacker sends a crafted WebSocket frame with a 64-bit extended payload length field where the most significant bit (MSB) is set (e.g., <code>0x8000000000000001</code>).</li>
<li>The server reads the 8-byte payload length but fails to validate that the MSB is zero, resulting in a negative integer value.</li>
<li>The negative value bypasses the bounds clamp in the <code>wsRead</code> function.</li>
<li>A slice operation with the negative length triggers a runtime panic due to out-of-bounds access.</li>
<li>The unrecovered panic propagates to the Go runtime, causing the entire NATS server process to terminate, disconnecting all clients.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a complete denial of service, crashing the entire NATS server process. All connected clients, including NATS, WebSocket, MQTT, cluster routes, gateways, and leaf nodes, are immediately disconnected. JetStream in-flight acknowledgments are lost, and Raft consensus is disrupted in clustered deployments. The attack is repeatable on every server restart, causing significant disruption to services relying on the NATS server. Any NATS server deployment with WebSocket listeners enabled is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the NATS server to version 2.11.14, 2.12.5, or later to patch CVE-2026-27889.</li>
<li>If upgrading is not immediately feasible, restrict access to the WebSocket port to trusted endpoints as a defense-in-depth measure, as mentioned in the overview.</li>
<li>Deploy the Sigma rule to detect connections with crafted websocket frame to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nats</category><category>websocket</category><category>denial-of-service</category><category>CVE-2026-27889</category><category>server-crash</category></item><item><title>Multiple Vulnerabilities in SWITCH EV Charging Stations</title><link>https://feed.craftedsignal.io/briefs/2026-02-switch-ev-vulns/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-switch-ev-vulns/</guid><description>Multiple vulnerabilities in SWITCH EV swtchenergy.com charging stations could allow attackers to impersonate stations, hijack sessions, cause denial of service, and manipulate backend data due to missing authentication, rate limiting issues, session expiration flaws, and exposed credentials.</description><content:encoded><![CDATA[<p>SWITCH EV&rsquo;s swtchenergy.com charging stations are affected by multiple vulnerabilities that could allow attackers to gain unauthorized access and disrupt services. These vulnerabilities include missing authentication mechanisms, lack of rate limiting on authentication requests, predictable session identifiers, and publicly accessible authentication identifiers. Successful exploitation could lead to station impersonation, session hijacking, denial-of-service attacks, and manipulation of backend data. The affected product is swtchenergy.com versions all/* . The vendor did not respond to CISA&rsquo;s request for coordination. The charging stations are deployed worldwide in the energy and transportation sectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a charging station ID via public mapping platforms (CVE-2026-27773).</li>
<li>Attacker connects to the OCPP WebSocket endpoint of the charging station using the discovered ID (CVE-2026-27767).</li>
<li>Because no authentication is required, the attacker impersonates the charging station.</li>
<li>Attacker sends malicious commands to the backend, potentially manipulating charging parameters or data (CVE-2026-27767).</li>
<li>Alternatively, the attacker floods the authentication endpoint with requests, causing a denial-of-service condition by overwhelming the backend (CVE-2026-25113).</li>
<li>Attacker hijacks a legitimate session by establishing a new connection using the same session identifier (CVE-2026-25778).</li>
<li>The legitimate charging station is disconnected, and the attacker receives backend commands intended for the legitimate station.</li>
<li>Attacker manipulates charging station behavior or data, causing disruption or financial loss.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could have significant consequences. Attackers could impersonate charging stations, hijack sessions, suppress or misroute traffic to cause large-scale denial-of-service attacks, and manipulate data sent to the backend. This could lead to widespread disruption of EV charging services, financial losses for charging station operators and users, and potential damage to the electrical grid. Given the global deployment of these charging stations in the energy and transportation sectors, the impact could be widespread.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections to OCPP WebSocket endpoints for connections without proper authentication to detect potential station impersonation attempts related to CVE-2026-27767.</li>
<li>Implement rate limiting on authentication requests to the WebSocket API to mitigate denial-of-service attacks as described in CVE-2026-25113.</li>
<li>Monitor for multiple connections using the same session identifier to detect potential session hijacking attempts related to CVE-2026-25778.</li>
<li>Monitor for access to swtchenergy.com from unusual or unexpected geolocations.</li>
<li>Consult SWITCH EV (swtchenergy.com) for potential mitigations or workarounds, as they did not respond to CISA&rsquo;s request for coordination.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>electric-vehicle</category><category>charging-station</category><category>websocket</category></item><item><title>PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-prefect-auth-bypass/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-prefect-auth-bypass/</guid><description>PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.</description><content:encoded><![CDATA[<p>PrefectHQ Prefect, a workflow management system, is vulnerable to an authentication bypass vulnerability identified as CVE-2026-7723. The vulnerability exists in versions up to 3.6.13 and stems from a flaw within the <code>/api/events/in</code> WebSocket endpoint. A remote attacker can manipulate data sent to this endpoint, leading to a failure in authentication checks. This can allow the attacker to perform unauthorized actions within the Prefect system. The vulnerability was published on 2026-05-04 and a patch is available in version 3.6.14, specifically commit <code>0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40</code>. Defenders should upgrade affected Prefect installations to version 3.6.14 or later to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a PrefectHQ Prefect instance running a vulnerable version (&lt;= 3.6.13) with an exposed <code>/api/events/in</code> WebSocket endpoint.</li>
<li>The attacker crafts a malicious WebSocket message specifically targeting the <code>/api/events/in</code> endpoint.</li>
<li>The attacker sends the manipulated message to the <code>/api/events/in</code> endpoint.</li>
<li>Due to the vulnerability, the authentication checks within the WebSocket endpoint fail to properly validate the attacker&rsquo;s identity.</li>
<li>The Prefect system incorrectly processes the attacker&rsquo;s request as authenticated.</li>
<li>The attacker exploits this lack of authentication to execute unauthorized actions within the Prefect system. These actions could include modifying workflows, accessing sensitive data, or disrupting operations.</li>
<li>The attacker may further leverage their access to compromise other connected systems or data stores.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7723 allows an unauthenticated remote attacker to bypass authentication mechanisms in PrefectHQ Prefect. This can lead to unauthorized access to sensitive data, modification of workflows, and disruption of critical business processes. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability. The number of affected organizations depends on the adoption rate of PrefectHQ Prefect, but any organization running a vulnerable version is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade PrefectHQ Prefect to version 3.6.14 or later to apply the patch (<code>0d3ab3c2d3f9f98abfafdf7b9f6d4f8ed3925e40</code>) that resolves CVE-2026-7723.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>/api/events/in</code> endpoint to detect potential exploitation attempts. Deploy the Sigma rule <code>Detect PrefectHQ Auth Bypass Attempt</code> to identify unusual requests to the vulnerable endpoint.</li>
<li>Implement network segmentation to limit the potential impact of a successful exploit by restricting access to sensitive resources from the Prefect server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>CVE-2026-7723</category><category>authentication-bypass</category><category>websocket</category><category>prefecthq</category></item><item><title>Signal K Server WebSocket Login Brute-Force Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-signalk-brute-force/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-signalk-brute-force/</guid><description>The Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.</description><content:encoded><![CDATA[<p>Signal K server versions 2.24.0 and earlier are vulnerable to credential brute-forcing via the WebSocket protocol. The vulnerability stems from the lack of rate limiting on the WebSocket login endpoint (<code>/signalk/v1/stream</code>), which allows attackers to bypass the existing HTTP rate limiting mechanism. By establishing a WebSocket connection, an attacker can send an unlimited number of login attempts, effectively bypassing the intended rate limiting defense of 100 attempts per 10 minutes on the HTTP login endpoints. This makes it feasible to conduct dictionary attacks and potentially gain unauthorized access to Signal K servers. Signal K servers are commonly deployed on boat networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Signal K server.</li>
<li>Attacker establishes a WebSocket connection to <code>ws://server:3000/signalk/v1/stream?subscribe=none</code>.</li>
<li>The server sends a hello message, confirming the connection.</li>
<li>Attacker sends a series of login attempts via WebSocket messages using the following JSON format: <code>{&quot;requestId&quot;: &quot;1&quot;, &quot;login&quot;: {&quot;username&quot;: &quot;admin&quot;, &quot;password&quot;: &quot;guess1&quot;}}</code>.</li>
<li>The server processes each login attempt without rate limiting.</li>
<li>Attacker continues sending login attempts using different password guesses.</li>
<li>If successful, the attacker gains unauthorized access to the Signal K server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass HTTP rate limiting and brute-force credentials to gain unauthorized access to Signal K servers. An attacker can achieve a brute-forcing speed of approximately 20 attempts per second, limited by the bcrypt hashing algorithm. A dictionary attack with 10,000 words can be completed in approximately 8 minutes over a single connection. Since Signal K servers are commonly deployed on boat networks, successful exploitation can lead to unauthorized access to sensitive maritime data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections to Signal K servers for unusually high rates of WebSocket login attempts. Create a detection rule that triggers when a single IP address sends more than 5 login attempts per second via the WebSocket protocol.</li>
<li>Deploy the Sigma rule <code>Detect High Volume SignalK WebSocket Login Attempts</code> to identify potential brute-force attacks against Signal K servers.</li>
<li>Upgrade Signal K servers to a patched version that includes rate limiting on the WebSocket login endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>websocket</category></item></channel></rss>