Cyber Posture

CVE-2026-20895

High

Published: 27 February 2026

Published
27 February 2026
Modified
05 March 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0005 16.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-20895 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Ev2Go Ev2Go.Io. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Remote Service Session Hijacking (T1563); ranked at the 16.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Remote Service Session Hijacking (T1563) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1563 Remote Service Session Hijacking Lateral Movement
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Vulnerability enables session hijacking via predictable/reusable identifiers (T1563 Remote Service Session Hijacking) and impersonation using valid session material (T1078 Valid Accounts).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection…

more

displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Deeper analysisAI

CVE-2026-20895 affects the WebSocket backend in charging station management systems, where charging station identifiers are used to uniquely associate sessions. However, the implementation permits multiple endpoints to connect using the same session identifier, resulting in predictable session identifiers. This flaw enables session hijacking or shadowing, in which the most recent connection displaces the legitimate charging station and intercepts backend commands intended for it. The vulnerability is associated with EV2Go (ev2go.io) and documented in CISA ICS Advisory ICSA-26-057-04, with a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and mapped to CWE-613 (Insufficient Session Expiration).

The vulnerability is exploitable over the network by unauthenticated attackers with low complexity requirements. An attacker can predict session identifiers to connect as a legitimate charging station, enabling unauthorized authentication as other users or interception of commands. Alternatively, a malicious actor can overwhelm the backend with valid session requests, causing a denial-of-service condition by displacing legitimate sessions.

CISA ICS Advisory ICSA-26-057-04, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-04, along with the corresponding CSAF file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-04.json, provides details on mitigation strategies for this operational technology vulnerability.

Details

CWE(s)

Affected Products

ev2go
ev2go.io
all versions

CVEs Like This One

CVE-2026-24731Same product: Ev2Go Ev2Go.Io
CVE-2026-25945Same product: Ev2Go Ev2Go.Io
CVE-2026-27764Shared CWE-613
CVE-2026-21622Shared CWE-613
CVE-2026-24912Shared CWE-613
CVE-2026-33417Shared CWE-613
CVE-2026-29092Shared CWE-613
CVE-2026-27649Shared CWE-613
CVE-2026-32663Shared CWE-613
CVE-2026-26290Shared CWE-613

References