A cluster of high-severity authentication and session‑management flaws in EV2GO’s ev2go.io charging-management platform has been disclosed by U.S. federal authorities, and the practical impact is stark: every version of the service is listed as affected, the vendor’s public endpoints expose weaknesses that enable station impersonation and session hijacking, and the technical profile of the defects makes large‑scale service disruption and data manipulation a credible real‑world threat to operators, drivers, and grid stakeholders.
EV charging infrastructure is now a critical axis where energy systems, transportation networks, and consumer services intersect, and software components that manage fleets of chargers — from site controllers to cloud management platforms — are central to keeping tens of thousands of charging points available and safe. On February 26, 2026, an official industrial control‑systems advisory named ev2go.io as subject to four coordinated CVE entries and assigned a near‑critical vendor score (CVSS-style severity reported as 9.4). The advisory attributes the research to security analysts Khaled Sarieddine and Mohammad Ali Sayed, and warns that exploitation could let attackers impersonate charging stations, hijack operator sessions, suppress or misroute legitimate traffic to cause large‑scale denial of service, and manipulate data sent to backend systems.
The affected product is used in the Energy and Transportation sectors and is deployed globally. The advisory lists the classes of failures as: Missing Authentication for a Critical Function, Improper Restriction of Excessive Authentication Attempts, Insufficient Session Expiration, and Insufficiently Protected Credentials. In plain language, those failures combine into an attack surface that is unusually easy to weaponize against Internet‑exposed charging infrastructure unless mitigations are applied quickly.
Vendors must publish clear remediation roadmaps, coordinate with customers on patch rollouts, and provide guidance for emergency configuration changes. For larger operators, the expectation is to perform independent verification of vendor patches (test, stage, then deploy) and to keep regulators and customers informed of any sustained outage or data integrity event.
However, the advisory also exposes structural problems:
Operators should treat any missing micro‑details as intentionally withheld for defensive reasons and rely on the advisory’s high‑level recommendations. Where claims are not directly verifiable from code or firmware (for example, the exact hashing algorithm used for stored credentials), treat them as operational risk signals and assume worst reasonable practice until proven otherwise.
Action is straightforward but urgent: treat this disclosure as an emergency patch and configuration priority, assume adversaries will scan for exposed controllers, and do not defer basic hardening such as network isolation, MFA, and token lifecycle fixes. The combination of public advisory pressure, credited researchers, and the critical‑sector context means regulators, energy operators, and platform vendors must move quickly and transparently to restore trust and operational safety in managed EV charging ecosystems.
Source: CISA EV2GO ev2go.io | CISA
Background
EV charging infrastructure is now a critical axis where energy systems, transportation networks, and consumer services intersect, and software components that manage fleets of chargers — from site controllers to cloud management platforms — are central to keeping tens of thousands of charging points available and safe. On February 26, 2026, an official industrial control‑systems advisory named ev2go.io as subject to four coordinated CVE entries and assigned a near‑critical vendor score (CVSS-style severity reported as 9.4). The advisory attributes the research to security analysts Khaled Sarieddine and Mohammad Ali Sayed, and warns that exploitation could let attackers impersonate charging stations, hijack operator sessions, suppress or misroute legitimate traffic to cause large‑scale denial of service, and manipulate data sent to backend systems.The affected product is used in the Energy and Transportation sectors and is deployed globally. The advisory lists the classes of failures as: Missing Authentication for a Critical Function, Improper Restriction of Excessive Authentication Attempts, Insufficient Session Expiration, and Insufficiently Protected Credentials. In plain language, those failures combine into an attack surface that is unusually easy to weaponize against Internet‑exposed charging infrastructure unless mitigations are applied quickly.
What the advisory actually says — the headline risks
- All public versions of ev2go.io were flagged as affected at the time of disclosure, meaning operators cannot rely on a narrow‑version safe window; the problem is systemic to the platform.
- WebSocket endpoints and station‑facing APIs lack proper authentication controls, enabling unauthorized entities to pose as legitimate charging stations. That’s particularly dangerous because charging systems often rely on simple station identifiers and ephemeral session tokens rather than strong device identity.
- Session management problems — sessions that never expire or that can be replayed — make it feasible for attackers to hijack administrative or station sessions after scanning or modest exploitation effort.
- Weak protections for credentials (storage or transport) mean attackers who gain a foothold can harvest or replay credentials to pivot across backend services.
- Excessive authentication attempts are not correctly limited, opening the door to credential‑stuffing and brute force attacks that can scale rapidly across a fleet.
Why this matters: risk to drivers, operators, and grids
EV charging platforms are not just convenience services; they coordinate physical assets (chargers), energy draw, and financial transactions. The most significant impacts from successful exploitation include:- Service availability impact for drivers: if attackers impersonate or suppress station connectivity, drivers can be turned away unexpectedly or face wait times that cascade across charging hubs.
- Revenue and billing fraud: manipulated session records or impersonated chargers can lead to incorrect billing, charge diversion, or theft of service.
- Operational safety and device misuse: while current disclosures focus on authentication and session handling rather than direct remote‑code execution or hardware sabotage, the ability to control charging sessions at scale can destabilize local site operations (overloading circuits, unexpected start/stop behavior).
- Grid and market impacts: coordinated manipulation of a large set of chargers (for example, forcing simultaneous charging or denying charging during peak periods) could stress local distribution infrastructure or undermine demand‑response programs.
- Supply‑chain and trust erosion: operators may be forced into emergency disconnects or costly audits; public confidence in managed charging offerings could erode quickly.
Technical analysis — what the weaknesses mean in practice
Missing authentication for critical functions
At its most straightforward, this class of flaw means that endpoints which should validate a station’s identity or confirm the caller’s administrative privileges simply do not enforce that check. In a charging ecosystem that uses identifiers and short‑lived session tokens to authenticate devices, absent or inadequate checks let an attacker:- Open a WebSocket or REST connection and claim a station identity; the backend accepts data and treats it as genuine.
- Inject telemetry events (start/stop charging, meter readings) that overwrite or corrupt system records.
- Use impersonation to deceive billing, monitoring, and control logic.
Improper restriction of excessive authentication attempts
If an API allows infinite login or token‑refresh attempts, attackers can brute force weak credentials or carry out credential‑stuffing using leaked credentials from unrelated breaches. Rate limits, account lockouts, and progressive throttling reduce the feasibility of large‑scale automated enumeration.Insufficient session expiration
Sessions that never expire or have overly long lifetimes allow stolen tokens or session IDs to be reused. In this context, a leaked admin session could be replayed days or weeks later. Correct session hygiene mandates short session lifetime, mandatory reauthentication for critical actions, single‑use tokens for device enrollment, and robust token revocation mechanisms.Insufficiently protected credentials
This covers both how credentials are stored (e.g., weak hashes, plaintext) and how they are transmitted. Best practice is salted, memory‑hard password hashes (Argon2, bcrypt with modern parameterization), encrypted secrets at rest (KMS or HSM usage), and transport encryption with TLS 1.2+ and strong cipher suites. Storing long‑term credentials in easily retrievable config files or logs is a recurring operational failure pattern that invites compromise.Immediate steps operators should take (checklist)
If you manage EV chargers or a fleet that relies on ev2go.io, prioritize the following actions now:- Isolate management interfaces: ensure charger management APIs and WebSocket endpoints are not directly reachable from the public internet. Move them behind VPNs or dedicated management networks.
- Block unnecessary inbound traffic: use firewall rules and network access control lists so only known infrastructure and IP ranges can reach charging management endpoints.
- Enforce MFA and rotate credentials: require multi‑factor authentication for all admin accounts; rotate all API keys, tokens, and service credentials used with the platform.
- Shorten session lifetimes and revoke tokens: reduce session TTLs and force logout of all active sessions until token handling is confirmed secure.
- Apply rate limiting and account lockouts: implement throttling for auth endpoints and lock accounts on repeated failures; log and alert such events.
- Increase logging and monitoring: enable detailed access and authentication logging (including WebSocket connection events) and forward logs to a centralized SIEM for correlation.
- Disable or restrict remote provisioning: if chargers can be provisioned or reprovisioned remotely, require out‑of‑band verification before device identity changes are accepted.
- Coordinate with vendor updates: monitor vendor communications for patches or configuration guidance and schedule immediate patching windows when available.
- Inform stakeholders and prepare incident response: notify internal risk, ops, and legal teams; prepare communications for customer‑facing impacts and establish a rapid incident response channel.
- Perform forensics on suspicious activity: search logs for reused session tokens, multiple auth failures, or station ID conflicts; export logs and preserve evidence if compromise is suspected.
Mid‑ and long‑term remediation: architectural fixes
Beyond emergency controls, operators and vendors should adopt architectural and engineering improvements:- Use device identity at the hardware layer: provision devices with unique X.509 client certificates or hardware‑backed keys from the factory or during secure on‑site commissioning. Avoid identity‑by‑name schemes.
- Adopt mutual TLS or equivalent for station/back‑end channels: WebSockets or control channels should require client certificates and restrict TLS to modern versions and ciphers.
- Harden session and token lifecycles: issue short‑lived tokens with secure refresh flows, scope tokens to minimal privileges, and ensure server‑side revocation lists and session blacklisting are supported.
- Centralize secrets with a KMS/HSM: do not place plaintext secrets in application config or logs; use vaulting and strict access control for credentials.
- Build rate limits and anomaly detection into the platform core: throttle and detect credential stuffing, enumerations, and sudden mass‑connect patterns.
- Implement code‑level security hygiene: threat modeling, authenticated fuzzing of WebSocket endpoints, routine static and dynamic code analysis, and third‑party security assessments.
- Offer transparent disclosures and coordinated patching timelines: vendors should publish CVE references, provide reproducible remediation steps, and support operators through the update process.
Detection, hunting, and indicators to watch
Security teams should look for the following red flags in logs and telemetry:- Repeated authentication failures against station or admin endpoints from the same source IP or distributed sources.
- Sudden spikes in WebSocket connections or unusual timing patterns (many stations connecting simultaneously with identical payloads).
- Session tokens reused from geographically disparate IPs, or tokens presented after a device has been offline.
- Conflicting telemetry for the same station ID (e.g., two different public IPs or two different geographic locations claiming the same station).
- Unusual API calls that change session state without corresponding human operator actions.
- Unexpected changes to billing or meter values; reconciliation mismatches between telemetry and site‑level meters.
Vendor obligations and the regulatory angle
Because EV2GO’s platform operates in the Energy and Transportation sectors and is deployed globally, this disclosure will draw regulator attention in multiple jurisdictions. Operators of critical infrastructure face obligations to report incidents in many countries, and government advisories now routinely require evidence that reasonable defensive measures were taken.Vendors must publish clear remediation roadmaps, coordinate with customers on patch rollouts, and provide guidance for emergency configuration changes. For larger operators, the expectation is to perform independent verification of vendor patches (test, stage, then deploy) and to keep regulators and customers informed of any sustained outage or data integrity event.
Strengths in the response — and lingering weaknesses
The rapid disclosure and public advisory are positive signals: the fact that the vulnerability cluster is documented publicly provides an opportunity for operators to act and establishes a record for coordinated remediation. The advisory credits named researchers, indicating coordinated reporting rather than adversarial disclosure, which increases the likelihood of responsible vendor remediation.However, the advisory also exposes structural problems:
- Listing all versions as affected suggests a design‑level flaw rather than an isolated bug that can be fixed with a single patch.
- The vulnerabilities center on authentication and session logic — fundamental primitives that are notoriously easy to misuse and costly to retrofit securely.
- The global deployment footprint raises the risk that many operators will delay patching for operational reasons or lack the staff to implement recommended mitigations rapidly.
- If too many operators leave platforms Internet‑exposed for operational convenience, the effective attack surface remains large even after vendor fixes are available.
Scenarios: likely attacker goals and playbooks
Given the nature of the flaws, adversaries may pursue one or more of the following objectives:- Service disruption: mass impersonation or session control to force out‑of‑service conditions (denial of service) across networks of chargers.
- Monetary gain: manipulate billing records or create phantom sessions, then monetize stolen energy or resell access.
- Espionage or persistence: establish persistent access in operator environments for long‑term intelligence gathering on energy demand profiles or to stage later disruptive attacks.
- Supply‑chain sabotage: use platform access to insert malicious logic or backdoors into downstream management systems that integrate charging telemetry with broader energy management.
Practical guidance for CTOs and SOC leaders
- Treat this as a Tier‑1 vulnerability: assign senior engineering and SOC resources to the response and prioritize protective configuration changes immediately.
- Execute emergency user and credential hygiene: force password resets and rotate API keys; require MFA for any operator or administrative operation.
- Implement network egress and ingress controls: if you cannot immediately fix the platform, reduce its exposure to the internet and restrict access to known operator IPs and secure tunnels.
- Run active hunts for indicator patterns: look for token reuse, multi‑location session tokens, rapid WebSocket connects, and spikes in failed logins.
- Schedule and test patches in controlled staging: avoid mass‑deployment of untested code into sites that cannot tolerate downtime; instead, stage patches and have rollback plans.
- Prepare customer communications: be transparent and proportional — provide operational status, mitigation steps taken, and expected timelines for full remediation.
Flagging what we do not yet know (and how we validated the core claims)
The disclosed advisory lists four CVEs and provides a high‑severity assessment with specific weakness classes and probable impacts. The advisory also reports that no public exploitation was known at the time of release. Some technical details are necessarily abstracted (for example, exact payloads, exploit proofs‑of‑concept, or the precise credential storage implementation used by the vendor), and those specifics must come from vendor patches and subsequent technical disclosure.Operators should treat any missing micro‑details as intentionally withheld for defensive reasons and rely on the advisory’s high‑level recommendations. Where claims are not directly verifiable from code or firmware (for example, the exact hashing algorithm used for stored credentials), treat them as operational risk signals and assume worst reasonable practice until proven otherwise.
Conclusion
The ev2go.io advisory is a reminder that authentication and session management are foundational to cyber‑physical safety. The reported flaws — affecting every listed version of the platform and enabling station impersonation, session hijacking, and large‑scale denial of service — create real operational risk for drivers, operators, and grid managers. Fixing the issue will require immediate operational controls (isolate management networks, rotate credentials, enable rate limiting and short session lifetimes) and a longer‑term architecture shift toward cryptographic device identity, mutual TLS, and centralized secret management.Action is straightforward but urgent: treat this disclosure as an emergency patch and configuration priority, assume adversaries will scan for exposed controllers, and do not defer basic hardening such as network isolation, MFA, and token lifecycle fixes. The combination of public advisory pressure, credited researchers, and the critical‑sector context means regulators, energy operators, and platform vendors must move quickly and transparently to restore trust and operational safety in managed EV charging ecosystems.
Source: CISA EV2GO ev2go.io | CISA