PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-31926 IGL-Technologies CVE debrief

CVE-2026-31926 is a medium-severity information exposure affecting IGL-Technologies eParking.fi (all versions per the advisory). CISA says charging station authentication identifiers are publicly accessible via web-based mapping platforms. The issue does not describe direct code execution or service takeover, but it can weaken confidentiality and help an attacker identify or target EV charging infrastructure. CISA’s advisory also states that updated OCPP server controls, stronger authentication, device whitelisting, rate limiting, and monitoring were implemented as mitigations, and that encrypted eParking OCPP deployments and IGL-Technologies’ eTolppa protocol are not impacted.

Vendor
IGL-Technologies
Product
eParking.fi
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-19
Original CVE updated
2026-03-19
Advisory published
2026-03-19
Advisory updated
2026-03-19

Who should care

Operators of IGL-Technologies eParking.fi deployments, EV charging network owners, OCPP integrators, and OT/ICS security teams responsible for connected charging infrastructure.

Technical summary

The source advisory describes publicly accessible charging station authentication identifiers exposed through web-based mapping platforms. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, consistent with a network-reachable information exposure that may also support limited downstream integrity impact. The advisory scope lists eParking.fi vers:all/* and notes that encrypted deployments of eParking OCPP servers and the proprietary eTolppa protocol are not impacted.

Defensive priority

Prioritize remediation if you operate affected eParking.fi OCPP infrastructure or rely on publicly mapped charging assets. This is not described as an availability emergency, but exposed identifiers can materially improve reconnaissance and targeting, so verification of exposure and application of vendor mitigations should be done promptly.

Recommended defensive actions

  • Inventory any use of IGL-Technologies eParking.fi and confirm whether the deployment matches the affected OCPP server exposure described in the advisory.
  • Apply the vendor’s updated security controls: stronger authentication, device-level whitelisting, rate limiting, and enhanced monitoring/alerting.
  • Verify whether your environment uses the encrypted eParking deployment or the proprietary eTolppa protocol, which the advisory says are not impacted.
  • Reduce unnecessary public exposure of charging station identifiers and review any web-based mapping or discovery services that may surface them.
  • Monitor for abnormal access patterns and investigate unexpected requests against OCPP-facing infrastructure.
  • Contact IGL-Technologies security at [email protected] if you need product-specific guidance.

Evidence notes

This debrief is based on CISA’s CSAF advisory ICSA-26-078-07 for CVE-2026-31926, published 2026-03-19, and the linked CVE record. The advisory text explicitly states that charging station authentication identifiers are publicly accessible via web-based mapping platforms and lists mitigations and non-impacted deployments. Vendor attribution in the broader corpus is low-confidence, so the advisory naming is treated as the primary source of product identity.

Official resources

Public coordinated disclosure. CISA published the advisory on 2026-03-19. No exploit code or offensive reproduction details are included in this debrief.