CVE-2026-20748
Published: 06 March 2026
Summary
CVE-2026-20748 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Everon Api.Everon.Io. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.
Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.
Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.
Terminating sessions and network connections upon completion prevents insufficient session expiration.
Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.
Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.
When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.
Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public-facing WebSocket backend directly enables remote exploitation (T1190) via predictable session IDs, facilitating session hijacking of remote services (T1563).
NVD Description
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection…
more
displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.
Deeper analysisAI
CVE-2026-20748, published on 2026-03-06, affects the WebSocket backend in a charging station management system. The vulnerability arises because the backend uses charging station identifiers to associate sessions but permits multiple endpoints to connect using the same session identifier. This design results in predictable session identifiers, facilitating session hijacking or shadowing, where the latest connection displaces the legitimate charging station and intercepts backend commands intended for it. Rated at CVSS 7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and mapped to CWE-613, it exposes low confidentiality, integrity, and availability impacts.
The attack requires only network access with low complexity and no privileges or user interaction. Remote attackers can exploit predictable session identifiers to connect as a legitimate charging station, enabling unauthorized authentication as other users by receiving and potentially acting on backend commands. Alternatively, a malicious actor can generate a denial-of-service condition by overwhelming the backend with valid session requests, displacing legitimate connections.
CISA has published ICS Advisory ICSA-26-062-08 addressing this vulnerability, with details available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-08 and the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-062-08.json.
Details
- CWE(s)