This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.
History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.
Title EVMAPA Insufficient Session Expiration
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-01-22T22:32:48.138Z

Reserved: 2025-08-20T20:20:15.075Z

Link: CVE-2025-55705

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-22T23:15:50.137

Modified: 2026-01-22T23:15:50.137

Link: CVE-2025-55705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.