CVE-2026-32663
Published: 20 March 2026
Summary
CVE-2026-32663 is a high-severity Insufficient Session Expiration (CWE-613) vulnerability in Igl Eparking.Fi. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-10 (Concurrent Session Control) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Limits the number of concurrent sessions per charging station identifier, directly preventing session shadowing or hijacking by disallowing multiple endpoints from connecting simultaneously with the same ID.
Protects the authenticity of WebSocket communications sessions, ensuring only legitimate charging stations maintain active sessions and mitigating displacement by unauthorized connections.
Requires secure generation and management of authenticators such as session identifiers, addressing predictable session IDs that enable attackers to guess and hijack legitimate sessions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln in public-facing WebSocket backend enables remote exploitation (T1190) via predictable/reusable session IDs, directly facilitating remote service session hijacking/shadowing to impersonate stations and intercept commands (T1563).
NVD Description
The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection…
more
displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.
Deeper analysisAI
CVE-2026-32663 is a vulnerability in the WebSocket backend of charging station management systems, where charging station identifiers are used to associate sessions but multiple endpoints can connect using the same session identifier. This design results in predictable session identifiers, enabling session hijacking or shadowing. In such attacks, the most recent connection displaces the legitimate charging station, allowing it to receive backend commands intended for that station.
The vulnerability has a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWE-613. Remote attackers require only network access, low attack complexity, and no privileges or user interaction. Successful exploitation allows unauthorized users to authenticate as other users or charging stations, potentially intercepting commands, or enables malicious actors to cause a denial-of-service condition by overwhelming the backend with valid session requests.
Mitigation details are provided in CISA ICS Advisory ICSA-26-078-08, available at https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-08, along with the corresponding CSAF JSON file at https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-078-08.json.
Details
- CWE(s)