Cyber Posture

CVE-2026-32663

High

Published: 20 March 2026

Published
20 March 2026
Modified
06 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0002 4.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32663 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Igl Eparking.Fi. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-10 (Concurrent Session Control) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Limits the number of concurrent sessions per charging station identifier, directly preventing session shadowing or hijacking by disallowing multiple endpoints from connecting simultaneously with the same ID.

prevent

Protects the authenticity of WebSocket communications sessions, ensuring only legitimate charging stations maintain active sessions and mitigating displacement by unauthorized connections.

prevent

Requires secure generation and management of authenticators such as session identifiers, addressing predictable session IDs that enable attackers to guess and hijack legitimate sessions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1563 Remote Service Session Hijacking Lateral Movement
Adversaries may take control of preexisting sessions with remote services to move laterally in an environment.
Why these techniques?

Vuln in public-facing WebSocket backend enables remote exploitation (T1190) via predictable/reusable session IDs, directly facilitating remote service session hijacking/shadowing to impersonate stations and intercept commands (T1563).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection…

more

displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Deeper analysisAI

CVE-2026-32663 is a vulnerability in the WebSocket backend of charging station management systems, where charging station identifiers are used to associate sessions but multiple endpoints can connect using the same session identifier. This design results in predictable session identifiers, enabling session hijacking or shadowing. In such attacks, the most recent connection displaces the legitimate charging station, allowing it to receive backend commands intended for that station.

The vulnerability has a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWE-613. Remote attackers require only network access, low attack complexity, and no privileges or user interaction. Successful exploitation allows unauthorized users to authenticate as other users or charging stations, potentially intercepting commands, or enables malicious actors to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Mitigation details are provided in CISA ICS Advisory ICSA-26-078-08, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-08, along with the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-078-08.json.

Details

CWE(s)

Affected Products

igl
eparking.fi
all versions

CVEs Like This One

CVE-2026-31903Same product: Igl Eparking.Fi
CVE-2026-24912Shared CWE-613
CVE-2026-26290Shared CWE-613
CVE-2026-20748Shared CWE-613
CVE-2026-25778Shared CWE-613
CVE-2026-27652Shared CWE-613
CVE-2026-25711Shared CWE-613
CVE-2026-27647Shared CWE-613
CVE-2026-27764Shared CWE-613
CVE-2026-26342Shared CWE-613

References