CVE-2026-22541
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-07

Last updated on: 2026-01-08

Assigner: S21sec

Description
The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-07
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
thales evcharger *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the massive sending of ICMP requests that causes a denial of service on one of the boards in the EVCharger. This board controls the EV interfaces, and if it is not operating correctly due to the attack, the charger itself will not function properly.


How can this vulnerability impact me? :

The impact of this vulnerability is a denial of service on the EVCharger, which means the charger may stop functioning correctly. This could prevent electric vehicles from being charged, causing inconvenience or disruption to users relying on the charger.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a massive sending of ICMP requests causing a denial of service. To detect it, monitor your network traffic for unusually high volumes of ICMP echo requests (ping). You can use commands like 'tcpdump icmp' or 'wireshark' to capture and analyze ICMP traffic. Additionally, using 'netstat' or 'ss' to check for excessive ICMP connections or monitoring system logs for ICMP flood alerts can help detect the attack.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing rate limiting or filtering of ICMP requests on your network devices or firewalls to prevent ICMP flood attacks. You can also configure intrusion prevention systems (IPS) to detect and block excessive ICMP traffic. Ensuring that the EVCharger board firmware is updated and monitoring the device for abnormal behavior are also recommended.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart