Cyber Posture

CVE-2026-24912

High

Published: 06 March 2026

Published
06 March 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 3.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-24912 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Epower Epower.Ie. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-613

Locks the device (typically after inactivity) until re-authentication, addressing insufficient session expiration by preventing indefinite access.

addresses: CWE-613

Automatically terminating sessions after a defined period directly enforces session expiration, preventing indefinite session lifetimes that attackers can exploit.

addresses: CWE-613

Re-authentication after inactivity or time-based triggers prevents indefinite use of potentially hijacked or stale sessions.

addresses: CWE-613

Terminating sessions and network connections upon completion prevents insufficient session expiration.

addresses: CWE-613

Directly enforces termination of network sessions after inactivity or end-of-session, preventing indefinite session lifetime.

addresses: CWE-613

Consistent clocks across systems allow session expiration and timeout enforcement to function as intended in distributed environments.

addresses: CWE-613

When the non-persistent artifact is a session or connection, mandatory termination implements the missing expiration that CWE-613 describes.

addresses: CWE-613

Timed refresh of session-related information or on-demand generation plus deletion implements proper session expiration.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1563 Remote Service Session Hijacking Lateral Movement
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment.
Why these techniques?

Public-facing WebSocket flaw directly enables exploitation via T1190; predictable/reusable session IDs allow takeover of remote service sessions (T1563) for impersonation and command access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection…

more

displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Deeper analysisAI

CVE-2026-24912 affects the WebSocket backend in charging station management systems, where sessions are uniquely associated using charging station identifiers. However, the implementation permits multiple endpoints to connect with the same session identifier, resulting in predictable identifiers that enable session hijacking or shadowing. In this scenario, the most recent connection displaces the legitimate charging station, allowing it to receive backend commands intended for that station. The vulnerability, classified under CWE-613 (Insufficient Session Expiration), carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and was published on 2026-03-06.

Network-accessible attackers require no privileges or user interaction to exploit this issue. By using a known or predictable session identifier, an unauthorized party can hijack a session, impersonate a legitimate charging station, and access commands or data meant for it, potentially enabling unauthorized authentication as other users. Alternatively, a malicious actor can cause a denial-of-service condition by overwhelming the backend with multiple valid session requests.

CISA has issued ICS Advisory ICSA-26-062-07 detailing the vulnerability, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-062-07, along with a corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-062-07.json. Additional information is provided on the vendor support page at https://epower.ie/support/.

Details

CWE(s)

Affected Products

epower
epower.ie
all versions

CVEs Like This One

CVE-2026-22552Same product: Epower Epower.Ie
CVE-2026-27778Same product: Epower Epower.Ie
CVE-2026-32663Shared CWE-613
CVE-2026-26290Shared CWE-613
CVE-2026-20748Shared CWE-613
CVE-2026-25778Shared CWE-613
CVE-2026-27652Shared CWE-613
CVE-2026-25711Shared CWE-613
CVE-2026-27647Shared CWE-613
CVE-2026-27764Shared CWE-613

References