Cybersecurity threats against Operational Technology (OT) and critical infrastructure are evolving rapidly. A recent CISA advisory (ICSA-26-078-07) highlights a critical set of vulnerabilities affecting IGL-Technologies eParking.fi software, widely used in Electric Vehicle (EV) charging management. With a CVSS score of 9.4, these flaws present a severe risk to Energy and Transportation Systems sectors worldwide.
This post analyzes the technical details of CVE-2026-29796 and associated issues, providing defenders with actionable detection rules and remediation strategies.
Technical Analysis
Affected Product: IGL-Technologies eParking.fi (All versions)
CVE Identified: CVE-2026-29796 (alongside other identified weaknesses)
Vulnerability Class: The advisory identifies multiple security issues including:
- Missing Authentication for Critical Function
- Improper Restriction of Excessive Authentication Attempts
- Insufficient Session Expiration
- Insufficiently Protected Credentials
Severity: CVSS v3 9.4 (CRITICAL)
Impact: Successful exploitation allows attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt services via Denial-of-Service (DoS) attacks. Given the integration with energy grids, the availability and integrity of these systems are paramount.
Defensive Monitoring
Defenders must assume that active scanning or exploitation attempts may already be underway. The following detection mechanisms focus on identifying exploitation behaviors on the management servers running eParking.fi or associated web services.
SIGMA Detection Rules
The following SIGMA rules detect common post-exploitation behaviors associated with web application vulnerabilities, such as web shells or unauthorized process spawning.
---
title: Potential Web Shell Creation in Web Directories
id: a1b2c3d4-e5f6-4a7b-8c9d-0e1f2a3b4c5d
status: experimental
description: Detects the creation of suspicious files in common web directories which may indicate web shell upload following exploitation of authentication vulnerabilities.
references:
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-07
author: Security Arsenal
date: 2026/03/29
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains:
- '\\inetpub\\wwwroot\\'
- '\\wwwroot\\'
- '\\htdocs\\'
TargetFilename|endswith:
- '.aspx'
- '.asp'
- '.php'
condition: selection
falsepositives:
- Legitimate administrative software updates
- Legitimate web application development
level: high
---
title: Web Server Process Spawning System Shell
id: b2c3d4e5-f6a7-4b8c-9d0e-1f2a3b4c5d6e
status: experimental
description: Detects web server processes spawning cmd.exe or powershell.exe, often indicative of successful Remote Code Execution (RCE) or authentication bypass exploitation.
references:
- https://attack.mitre.org/techniques/T1059/
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-07
author: Security Arsenal
date: 2026/03/29
tags:
- attack.execution
- attack.t1059.001
- attack.t1059.003
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\\w3wp.exe'
- '\\httpd.exe'
- '\\nginx.exe'
- '\\java.exe'
Image|endswith:
- '\\cmd.exe'
- '\\powershell.exe'
- '\\pwsh.exe'
condition: selection
falsepositives:
- Legitimate administrative scripts run by developers
- Server management tools
level: critical
KQL Queries (Microsoft Sentinel/Defender)
Use these queries to hunt for signs of brute force attacks or suspicious administrative activity related to the eParking.fi management interface.
// Hunt for excessive failed login attempts (Brute Force)
// Adjust the 'ServiceName' or 'TargetUserName' based on your specific eParking.fi logs if ingested
SigninLogs
| where ResultType == "50126" or ResultType == "50053" // Failure codes example
| summarize count() by UserPrincipalName, IPAddress, bin(TimeGenerated, 5m)
| where count_ > 5
| project TimeGenerated, UserPrincipalName, IPAddress, count_
| order by TimeGenerated desc
// Detect successful administrative logins from unfamiliar locations or devices
// This helps identify unauthorized administrative control gained via auth bypass
DeviceLogonEvents
| where ActionType == "LogonSuccess" and LogonType == "10" // RemoteInteractive
| extend OSVer = tostring(OSVersion)
| project Timestamp, AccountName, AccountDomain, DeviceName, RemoteIP, RemoteDeviceName
| order by Timestamp desc
Velociraptor VQL Hunt
These VQL artifacts are designed to hunt for web shells or suspicious modifications on the endpoint hosting the management software.
-- Hunt for recently modified ASPX/PHP files in web directories
SELECT FullPath, Mtime, Atime, Size, Mode
FROM glob(globs='C:\\inetpub\wwwroot\**\*.aspx')
OR glob(globs='C:\\inetpub\wwwroot\**\*.php')
WHERE Mtime > timestamp(now) - 3600
OR Size < 5 -- Detect tiny web shells
-- Hunt for processes spawned by IIS worker processes
SELECT Name, Pid, Ppid, Exe, CommandLine, StartTime
FROM pslist()
WHERE Ppid IN (SELECT Pid FROM pslist() WHERE Name =~ "w3wp")
AND Name =~ "(cmd|powershell|pwsh)"
PowerShell Verification
This script helps identify if unauthorized local users have been created, a common step after gaining administrative control.
<#
.SYNOPSIS
Audit local users for suspicious creation dates.
.DESCRIPTION
Checks for local user accounts created recently or with suspicious characteristics.
#>
$CutoffDate = (Get-Date).AddDays(-7)
$SuspiciousUsers = Get-LocalUser | Where-Object { $_.LastLogon -gt $CutoffDate -or $_.PasswordLastSet -gt $CutoffDate }
if ($SuspiciousUsers) {
Write-Host "[!] Potential unauthorized user activity detected:" -ForegroundColor Red
$SuspiciousUsers | Format-Table Name, PrincipalSource, LastLogon, PasswordLastSet, Enabled
} else {
Write-Host "[+] No suspicious local user accounts found within the last 7 days." -ForegroundColor Green
}
Remediation
Organizations utilizing IGL-Technologies eParking.fi must act immediately to secure their environments.
-
Patch and Update: Contact IGL-Technologies or check the vendor portal immediately for the latest security patches addressing CVE-2026-29796. Apply patches to all affected instances.
-
Isolate Management Systems: If immediate patching is not possible, place the management systems behind a VPN and restrict access strictly to necessary administrative IP ranges. Do not expose the management interface directly to the public internet.
-
Audit Access: Conduct a thorough audit of system logs for the past 30 days. Look for successful logins outside of business hours or from unusual geographic locations.
-
Reset Credentials: Assume that credentials may have been exposed due to "Insufficiently Protected Credentials" flaws. Force a password reset for all administrative accounts and enforce strong password complexity.
-
Network Segmentation: Ensure EV charging stations are segmented from the corporate IT network. Limit communication strictly to required protocols and ports.
Related Resources
Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.