PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-26051 Unknown Vendor CVE debrief

CVE-2026-26051 is a critical authentication failure in Mobiliti e-mobi.hu affecting OCPP WebSocket endpoints. According to CISA, an unauthenticated attacker can use a known or discovered charging-station identifier to connect as a legitimate charger, issue or receive OCPP commands, impersonate a station, and corrupt backend-reported charging data. The issue was published by CISA on 2026-03-03 and carries a CVSS 3.1 score of 9.4.

Vendor
Unknown Vendor
Product
Mobiliti e-mobi.hu vers:all/*
CVSS
CRITICAL 9.4
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-03
Original CVE updated
2026-03-03
Advisory published
2026-03-03
Advisory updated
2026-03-03

Who should care

Operators, integrators, and security teams responsible for Mobiliti/e-mobi.hu EV charging deployments, especially environments exposing OCPP WebSocket services to untrusted networks.

Technical summary

The advisory describes missing authentication on the WebSocket endpoint used for OCPP communications. Because the endpoint accepts sessions without proper authentication, an attacker can impersonate a charging station using a known or discovered station identifier and interact with backend systems as if they were a legitimate charger. The result can include unauthorized control of charging infrastructure, privilege escalation, and corruption of telemetry or operational data sent to the backend.

Defensive priority

Immediate

Recommended defensive actions

  • Restrict exposure of the OCPP WebSocket endpoint to trusted networks and only allow authorized management paths.
  • Require strong authentication and per-station authorization before accepting WebSocket or OCPP sessions.
  • Validate station identifiers and reject unauthenticated or unexpected session initiation attempts.
  • Monitor for station impersonation, abnormal command traffic, and backend data anomalies tied to charging stations.
  • Apply CISA ICS recommended practices and defense-in-depth guidance to harden the charging management environment.
  • Use the vendor contact path in the advisory to request remediation status and updates.

Evidence notes

All core claims are taken from CISA CSAF ICSA-26-062-06 and its linked references. The advisory text states that WebSocket endpoints lack proper authentication, enabling unauthorized station impersonation, OCPP command abuse, and backend data corruption. The supplied corpus also records that Mobiliti did not respond to CISA's request for coordination. Published and modified dates in the supplied source are 2026-03-03.

Official resources

CISA published the advisory and CVE on 2026-03-03. The supplied source states that Mobiliti did not respond to CISA's coordination request. No KEV listing is included in the supplied corpus.