IGL-Technologies eParking.fi
CISA disclosed four critical vulnerabilities in IGL-Technologies eParking.fi electric vehicle charging infrastructure affecting all versions worldwide. The flaws enable unauthenticated attackers to gain administrative control over charging stations, perform session hijacking, conduct DoS attacks, and manipulate charging network data via unprotected WebSocket endpoints.
Summary
CISA disclosed four critical vulnerabilities in IGL-Technologies eParking.fi electric vehicle charging infrastructure affecting all versions worldwide. The flaws enable unauthenticated attackers to gain administrative control over charging stations, perform session hijacking, conduct DoS attacks, and manipulate charging network data via unprotected WebSocket endpoints.
Full text
ICS Advisory IGL-Technologies eParking.fi Release DateMarch 19, 2026 Alert CodeICSA-26-078-07 Related topics: Industrial Control System Vulnerabilities, Industrial Control Systems View CSAF Summary Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks. The following versions of IGL-Technologies eParking.fi are affected: eParking.fi vers:all/* CVSS Vendor Equipment Vulnerabilities v3 9.4 IGL-Technologies IGL-Technologies eParking.fi Missing Authentication for Critical Function, Improper Restriction of Excessive Authentication Attempts, Insufficient Session Expiration, Insufficiently Protected Credentials Background Critical Infrastructure Sectors: Energy, Transportation Systems Countries/Areas Deployed: Worldwide Company Headquarters Location: Finland Vulnerabilities Expand All + CVE-2026-29796 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend. View CVE Details Affected Products IGL-Technologies eParking.fi Vendor:IGL-Technologies Product Version:IGL-Technologies eParking.fi: vers:all/* Product Status:known_affected Remediations MitigationIGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:1) Enforce modern security profiles and stronger authentication.2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.4) Enhanced automated monitoring and alerting to detection abnormal network activity.Devices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities. MitigationTo prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals. MitigationFor more information please contact the IGL-Technologies security team at this email address: security@igl.fi.mailto:security@igl.fi Relevant CWE: CWE-306 Missing Authentication for Critical Function Metrics CVSS Version Base Score Base Severity Vector String 3.1 9.4 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L CVE-2026-31903 The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access. View CVE Details Affected Products IGL-Technologies eParking.fi Vendor:IGL-Technologies Product Version:IGL-Technologies eParking.fi: vers:all/* Product Status:known_affected Remediations MitigationIGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:1) Enforce modern security profiles and stronger authentication.2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.4) Enhanced automated monitoring and alerting to detection abnormal network activity. MitigationDevices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities. MitigationTo prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals. MitigationFor more information please contact the IGL-Technologies security team at this email address: security@igl.fi.mailto:security@igl.fi Relevant CWE: CWE-307 Improper Restriction of Excessive Authentication Attempts Metrics CVSS Version Base Score Base Severity Vector String 3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVE-2026-32663 The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests. View CVE Details Affected Products IGL-Technologies eParking.fi Vendor:IGL-Technologies Product Version:IGL-Technologies eParking.fi: vers:all/* Product Status:known_affected Remediations MitigationIGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:1) Enforce modern security profiles and stronger authentication.2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.4) Enhanced automated monitoring and alerting to detection abnormal network activity. MitigationDevices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities. MitigationTo prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals. MitigationFor more information please contact the IGL-Technologies security team at this email address: security@igl.fi.mailto:security@igl.fi Relevant CWE: CWE-613 Insufficient Session Expiration Metrics CVSS Version Base Score Base Severity Vector String 3.1 7.3 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L CVE-2026-31926 Charging station authentication identifiers are publicly accessible via web-based mapping platforms. View CVE Details Affected Products IGL-Technologies eParking.fi Vendor:IGL-Technologies Product Version:IGL-Technologies eParking.fi: vers:all/* Product Status:known_affected Remediations MitigationIGL-Technologies has updated eParking's OCPP servers to reduce the risks posed by the vulnerability. These updates implemented the following security controls:1) Enforce modern security profiles and stronger authentication.2) Device‑level whitelisting was implemented to ensure that only authorized charging units can connect.3) Rate‑limiting controls prevent excessive requests and reduces DoS risk.4) Enhanced automated monitoring and alerting to detection abnormal network activity. MitigationDevices using the encrypted deployment of eParking's OCPP servers or IGL-Technologies proprietary eTolppa protocol are not impacted by these vulnerabilities. MitigationTo prevent this in the future IGL-Technologies will continue vulnerability monitoring under their ISO 27001:2022 security program and tighten security requirements for future third‑party OCPP hardware approvals. MitigationFor more information please contact the IGL-Technologies security team at this email address: security@igl.fi.mailto:security@igl.fi Re
Indicators of Compromise
- cve — CVE-2026-29796
- cve — CVE-2026-31903
- cve — CVE-2026-32663
- cve — CVE-2026-31926
- email — security@igl.fi