IGL-Technologies eParking.fi
eParking.fi contains multiple authentication and input validation weaknesses (CWE-306, CWE-307, CWE-613, CWE-522) that allow attackers without credentials to gain unauthorized administrative control of OCPP charging servers or conduct denial-of-service attacks. The vulnerability affects all versions of eParking.fi using unencrypted OCPP protocol. Deployments using encrypted OCPP or IGL-Technologies' proprietary eTolppa protocol are not affected. IGL-Technologies has updated its OCPP server infrastructure with stronger authentication, device whitelisting, rate-limiting, and monitoring, but no patch is available for existing customer deployments. The vendor has not planned security updates for customer-managed eParking instances.
- Network access to the eParking OCPP server (typically port 443 or 8080 for OCPP communication)
- eParking.fi deployment using unencrypted OCPP protocol (encrypted or eTolppa protocol deployments are not affected)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e0862cb4-e549-406c-8277-16dec2689547Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.