PatchSiren cyber security CVE debrief
CVE-2026-26051 Unknown Vendor CVE debrief
CVE-2026-26051 is a critical authentication failure in Mobiliti e-mobi.hu affecting OCPP WebSocket endpoints. According to CISA, an unauthenticated attacker can use a known or discovered charging-station identifier to connect as a legitimate charger, issue or receive OCPP commands, impersonate a station, and corrupt backend-reported charging data. The issue was published by CISA on 2026-03-03 and carries a CVSS 3.1 score of 9.4.
- Vendor
- Unknown Vendor
- Product
- Mobiliti e-mobi.hu vers:all/*
- CVSS
- CRITICAL 9.4
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-03
- Original CVE updated
- 2026-03-03
- Advisory published
- 2026-03-03
- Advisory updated
- 2026-03-03
Who should care
Operators, integrators, and security teams responsible for Mobiliti/e-mobi.hu EV charging deployments, especially environments exposing OCPP WebSocket services to untrusted networks.
Technical summary
The advisory describes missing authentication on the WebSocket endpoint used for OCPP communications. Because the endpoint accepts sessions without proper authentication, an attacker can impersonate a charging station using a known or discovered station identifier and interact with backend systems as if they were a legitimate charger. The result can include unauthorized control of charging infrastructure, privilege escalation, and corruption of telemetry or operational data sent to the backend.
Defensive priority
Immediate
Recommended defensive actions
- Restrict exposure of the OCPP WebSocket endpoint to trusted networks and only allow authorized management paths.
- Require strong authentication and per-station authorization before accepting WebSocket or OCPP sessions.
- Validate station identifiers and reject unauthenticated or unexpected session initiation attempts.
- Monitor for station impersonation, abnormal command traffic, and backend data anomalies tied to charging stations.
- Apply CISA ICS recommended practices and defense-in-depth guidance to harden the charging management environment.
- Use the vendor contact path in the advisory to request remediation status and updates.
Evidence notes
All core claims are taken from CISA CSAF ICSA-26-062-06 and its linked references. The advisory text states that WebSocket endpoints lack proper authentication, enabling unauthorized station impersonation, OCPP command abuse, and backend data corruption. The supplied corpus also records that Mobiliti did not respond to CISA's request for coordination. Published and modified dates in the supplied source are 2026-03-03.
Official resources
-
CVE-2026-26051 CVE record
CVE.org
-
CVE-2026-26051 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
CISA published the advisory and CVE on 2026-03-03. The supplied source states that Mobiliti did not respond to CISA's coordination request. No KEV listing is included in the supplied corpus.