CVE-2026-22541
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-08
Assigner: S21sec
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thales | evcharger | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the massive sending of ICMP requests that causes a denial of service on one of the boards in the EVCharger. This board controls the EV interfaces, and if it is not operating correctly due to the attack, the charger itself will not function properly.
How can this vulnerability impact me? :
The impact of this vulnerability is a denial of service on the EVCharger, which means the charger may stop functioning correctly. This could prevent electric vehicles from being charged, causing inconvenience or disruption to users relying on the charger.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves a massive sending of ICMP requests causing a denial of service. To detect it, monitor your network traffic for unusually high volumes of ICMP echo requests (ping). You can use commands like 'tcpdump icmp' or 'wireshark' to capture and analyze ICMP traffic. Additionally, using 'netstat' or 'ss' to check for excessive ICMP connections or monitoring system logs for ICMP flood alerts can help detect the attack.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include implementing rate limiting or filtering of ICMP requests on your network devices or firewalls to prevent ICMP flood attacks. You can also configure intrusion prevention systems (IPS) to detect and block excessive ICMP traffic. Ensuring that the EVCharger board firmware is updated and monitoring the device for abnormal behavior are also recommended.