CloudCharge cloudcharge.se
Multiple authentication and session management vulnerabilities in CloudCharge charging station platform affect all versions. Vulnerabilities allow attackers to impersonate charging stations (CWE-306), bypass authentication controls (CWE-307, CWE-613), and intercept session data (CWE-522). Successful exploitation enables session hijacking, charging station impersonation, traffic suppression causing denial of service, and manipulation of charging data sent to backend systems. The vendor has not responded to coordination requests and has indicated no fix is planned.
- Network access to CloudCharge communication channels (HTTP/HTTPS)
- No valid credentials required for initial exploitation
- Access to network segment where charging station traffic is visible
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8af193b5-abe0-4a4e-82ae-c0c5bea18b8aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.