Introduction
The rapid expansion of Electric Vehicle (EV) infrastructure brings new cybersecurity challenges to the Energy and Transportation sectors. Recently, CISA released an advisory (ICSA-26-062-08) regarding critical vulnerabilities affecting Everon OCPP Backends. These flaws pose a significant risk, potentially allowing attackers to gain unauthorized administrative control over charging stations or disrupt services entirely. For defenders managing Operational Technology (OT) and IoT environments, understanding the risks associated with the Open Charge Point Protocol (OCPP) implementations is essential to maintaining service availability and grid safety.
Technical Analysis
The advisory identifies multiple security weaknesses in the api.everon.io backend, affecting all versions of the Everon OCPP Backends. The aggregate CVSS v3 score is 9.4 (Critical), indicating a high urgency for remediation.
The vulnerabilities primarily stem from weaknesses in identity and access management controls:
- Missing Authentication for Critical Function (CVE-2026-26288): Specific WebSocket endpoints lack necessary authentication controls, allowing unauthenticated interaction with the backend.
- Improper Restriction of Excessive Authentication Attempts: The system does not adequately limit login attempts, facilitating brute-force attacks against charging station accounts.
- Insufficient Session Expiration: User sessions remain active for too long, increasing the risk of session hijacking.
- Insufficiently Protected Credentials: Credentials may be stored or transmitted in a manner that allows interception or recovery.
Affected Products:
- Everon OCPP Backends (
api.everon.io) - Versions: All (
vers:all/*)
If exploited, these vulnerabilities could allow threat actors to manipulate charging station settings, halt charging operations (Denial of Service), or potentially pivot into broader energy management networks.
Defensive Monitoring
Defenders should actively monitor network traffic for anomalies associated with the api.everon.io endpoints. Since these vulnerabilities involve authentication bypasses and brute-force attempts, security teams should look for an unusual volume of failed login attempts or successful connections from unexpected IP ranges.
KQL Query for Microsoft Sentinel/Defender
Use the following KQL query to detect potential brute-force activity or suspicious traffic patterns targeting the Everon API endpoints within your network logs or proxy logs.
let TargetDomain = "api.everon.io";
let TimeFrame = 1h;
CommonSecurityLog
| where TimeGenerated > ago(TimeFrame)
| where DestinationUrl contains TargetDomain
// Look for excessive HTTP 401 or 403 responses indicating auth failures
| where StatusCode in (401, 403)
| summarize Count = count() by SourceIP, DestinationUrl, ApplicationProtocol
| where Count > 10 // Threshold for alerting
| project TimeGenerated, SourceIP, DestinationUrl, Count, ApplicationProtocol
| extend AlertMessage = "High volume of auth failures detected against Everon OCPP Backend"
PowerShell Verification Script
The following PowerShell script can be used by administrators to audit network connections or check for specific DNS resolution patterns within their environment to identify assets communicating with the vulnerable backend.
<#
.SYNOPSIS
Checks for active connections to api.everon.io
.DESCRIPTION
This script checks local DNS cache and active connections to identify
potential communication with vulnerable Everon OCPP backends.
#>
$TargetHost = "api.everon.io"
Write-Host "Checking DNS resolution for $TargetHost..." -ForegroundColor Cyan
try {
$dnsResult = Resolve-DnsName -Name $TargetHost -ErrorAction Stop
Write-Host "[+] Resolution Successful:" -ForegroundColor Green
$dnsResult | Select-Object Name, Type, IP4Address, IPAddress
}
catch {
Write-Host "[-] DNS Resolution failed. Host may be unreachable or blocked." -ForegroundColor Yellow
}
Write-Host "Checking recent TCP connections..." -ForegroundColor Cyan
# Get TCP connections that might be related (Port 443/80)
$connections = Get-NetTCPConnection -State Established -ErrorAction SilentlyContinue |
Where-Object { $_.RemoteAddress -ne "0.0.0.0" -and $_.RemoteAddress -notlike "127.*" }
if ($connections) {
$found = $false
foreach ($conn in $connections) {
try {
$remoteHost = [System.Net.Dns]::GetHostEntry($conn.RemoteAddress).HostName
if ($remoteHost -like "*everon*" -or $remoteHost -eq $TargetHost) {
Write-Host "[!] Active connection found to: $remoteHost ($($conn.RemoteAddress)): $($conn.RemotePort)" -ForegroundColor Red
$found = $true
}
}
catch {
# Ignore reverse lookup failures
}
}
if (-not $found) {
Write-Host "[No active connections to Everon backends detected currently.]" -ForegroundColor Green
}
}
else {
Write-Host "No active TCP connections found." -ForegroundColor Yellow
}
Remediation
Organizations utilizing Everon OCPP Backends must take immediate action to mitigate the risk of unauthorized administrative control.
1. Patch and Update
Contact Everon support immediately to apply the latest security patches. Since the advisory affects all/* versions, upgrading to the latest secure firmware is mandatory to resolve CVE-2026-26288 and associated authentication issues.
2. Network Segmentation and Access Control
- Restrict IP Access: Implement strict firewall rules to ensure that the
api.everon.iobackend is only accessible from trusted IP addresses used by the charging stations or management network. - Isolate OT Networks: Ensure EV charging infrastructure is segmented from the corporate IT network to prevent lateral movement.
3. Enforce Strong Authentication
- Ensure that the backend is configured to require strong, complex passwords for all administrative and charging station accounts.
- If available, enforce Multi-Factor Authentication (MFA) for administrative access to the OCPP backend.
4. Review Session Management
- Configure session timeouts to the shortest allowable duration to minimize the window of opportunity for session hijacking.
- Ensure that sessions are invalidated immediately after logout.
5. Audit Logs
- Enable comprehensive logging for all API interactions and authentication attempts. Regularly review these logs for patterns indicative of brute-force attacks or unauthorized access attempts.
Related Resources
Security Arsenal Managed SOC Services AlertMonitor Platform Book a SOC Assessment soc-mdr Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.