Cyber Posture

CVE-2025-55705

High

Published: 22 January 2026

Published
22 January 2026
Modified
12 February 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 6.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-55705 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Evmapa Evmapa. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct exploitation of a network-accessible backend service via insufficient session expiration, enabling unauthenticated reuse of valid IDs for unauthorized access and session manipulation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and…

more

expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

Deeper analysisAI

CVE-2025-55705, published on 2026-01-22, is a vulnerability stemming from insufficient session expiration (CWE-613) in backend systems managing charging stations. The issue arises when the system permits multiple simultaneous connections using the same charging station ID due to inadequate session management and lack of expiration controls. This flaw carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity with network accessibility and no prerequisites for exploitation.

Remote, unauthenticated attackers can exploit this vulnerability by reusing valid charging station IDs to establish multiple concurrent sessions. Successful exploitation may lead to unauthorized access, data inconsistency across sessions, or manipulation of active charging sessions, potentially disrupting operations or enabling further compromise.

The CISA ICS Advisory ICSA-26-022-08, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-022-08, along with its CSAF document at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-022-08.json, provides guidance on mitigation strategies and affected products. Security practitioners should consult these resources for patching instructions and workarounds.

Details

CWE(s)

Affected Products

evmapa
evmapa
all versions

CVEs Like This One

CVE-2025-54816Same product: Evmapa Evmapa
CVE-2025-53968Same product: Evmapa Evmapa
CVE-2026-26342Shared CWE-613
CVE-2026-24912Shared CWE-613
CVE-2026-33417Shared CWE-613
CVE-2026-32663Shared CWE-613
CVE-2026-26290Shared CWE-613
CVE-2026-26060Shared CWE-613
CVE-2026-20748Shared CWE-613
CVE-2026-25778Shared CWE-613

References