CVE-2026-20792 (GCVE-0-2026-20792)
Vulnerability from cvelistv5 – Published: 2026-02-26 23:06 – Updated: 2026-02-26 23:06
VLAI?
Title
Chargemap chargemap.com Improper Restriction of Excessive Authentication Attempts
Summary
The WebSocket Application Programming Interface lacks restrictions on
the number of authentication requests. This absence of rate limiting may
allow an attacker to conduct denial-of-service attacks by suppressing
or misrouting legitimate charger telemetry, or conduct brute-force
attacks to gain unauthorized access.
Severity ?
7.5 (High)
CWE
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Chargemap | chargemap.com |
Affected:
All versions
|
Credits
Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "chargemap.com",
"vendor": "Chargemap",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Khaled Sarieddine and Mohammad Ali Sayed reported this vulnerability to CISA"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The WebSocket Application Programming Interface lacks restrictions on \nthe number of authentication requests. This absence of rate limiting may\n allow an attacker to conduct denial-of-service attacks by suppressing \nor misrouting legitimate charger telemetry, or conduct brute-force \nattacks to gain unauthorized access."
}
],
"value": "The WebSocket Application Programming Interface lacks restrictions on \nthe number of authentication requests. This absence of rate limiting may\n allow an attacker to conduct denial-of-service attacks by suppressing \nor misrouting legitimate charger telemetry, or conduct brute-force \nattacks to gain unauthorized access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T23:06:29.969Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://chargemap.com/en-us/support"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-05"
},
{
"url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-05.json"
}
],
"source": {
"advisory": "ICSA-26-057-05",
"discovery": "EXTERNAL"
},
"title": "Chargemap chargemap.com Improper Restriction of Excessive Authentication Attempts",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Chargemap did not respond to CISA\u0027s request for coordination. Contact \nChargemap using their contact page here: \n\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://chargemap.com/en-us/support\"\u003ehttps://chargemap.com/en-us/support\u003c/a\u003e for more information.\n\n\u003cbr\u003e"
}
],
"value": "Chargemap did not respond to CISA\u0027s request for coordination. Contact \nChargemap using their contact page here: \n https://chargemap.com/en-us/support for more information."
}
],
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2026-20792",
"datePublished": "2026-02-26T23:06:29.969Z",
"dateReserved": "2026-02-20T18:28:15.455Z",
"dateUpdated": "2026-02-26T23:06:29.969Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…