CVE-2026-22878
Awaiting Analysis Awaiting Analysis - Queue
Exposure of Charging Station Authentication Identifiers via Web Mapping

Publication date: 2026-02-27

Last updated on: 2026-03-05

Assigner: ICS-CERT

Description
Charging station authentication identifiers are publicly accessible via web-based mapping platforms.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-27
Last Modified
2026-03-05
Generated
2026-05-07
AI Q&A
2026-02-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mobility46 mobility46.se *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves charging station authentication identifiers being publicly accessible through web-based mapping platforms. This means that sensitive authentication information intended to secure charging stations is exposed to anyone who accesses these mapping services.


How can this vulnerability impact me? :

Because authentication identifiers are publicly accessible, unauthorized users could potentially gain access to charging stations. This could lead to unauthorized use, manipulation, or disruption of the charging infrastructure, impacting availability and security.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves charging station authentication identifiers being publicly accessible via web-based mapping platforms. Detection would involve monitoring network traffic or system logs for unauthorized access or exposure of these identifiers.

Since the identifiers are accessible through web-based platforms, one way to detect this vulnerability is to query or scan these platforms for exposed authentication identifiers related to your charging stations.

Specific commands or tools are not provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps are not explicitly detailed in the provided information.

However, general best practices would include restricting public access to authentication identifiers, reviewing and updating access controls on web-based mapping platforms, and monitoring for unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart