Mobility46.Se

4 CVEs product

Monthly

CVE-2026-27647 HIGH This Week

Mobility46.Se's WebSocket implementation allows multiple connections to share predictable session identifiers, enabling attackers to intercept and hijack active charging station sessions without authentication. An attacker can impersonate legitimate stations to execute arbitrary backend commands, intercept communications, or launch denial-of-service attacks by flooding the service with valid session requests. No patch is currently available for this vulnerability.

Authentication Bypass Mobility46.Se
NVD GitHub
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-27028 CRITICAL Act Now

Missing WebSocket authentication — sixth CVE in the industrial platform WebSocket family. Same pattern of unauthenticated access enabling station impersonation and data injection.

Authentication Bypass Mobility46.Se
NVD GitHub
CVSS 3.1
9.4
EPSS
0.1%
CVE-2026-26305 HIGH This Week

Mobility46.Se's WebSocket API fails to implement authentication rate limiting, enabling remote attackers to launch denial-of-service attacks against charger telemetry systems or conduct brute-force attacks to compromise accounts. The vulnerability requires no authentication or user interaction and affects all network-accessible instances. No patch is currently available.

Authentication Bypass Mobility46.Se
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22878 MEDIUM This Month

Mobility46.Se charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated attackers to obtain sensitive authentication data. This disclosure could enable unauthorized access to charging infrastructure and associated user accounts. No patch is currently available to address this exposure.

Authentication Bypass Mobility46.Se
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-27647
EPSS 0% CVSS 7.3
HIGH This Week

Mobility46.Se's WebSocket implementation allows multiple connections to share predictable session identifiers, enabling attackers to intercept and hijack active charging station sessions without authentication. An attacker can impersonate legitimate stations to execute arbitrary backend commands, intercept communications, or launch denial-of-service attacks by flooding the service with valid session requests. No patch is currently available for this vulnerability.

Authentication Bypass Mobility46.Se
NVD GitHub
CVE-2026-27028
EPSS 0% CVSS 9.4
CRITICAL Act Now

Missing WebSocket authentication — sixth CVE in the industrial platform WebSocket family. Same pattern of unauthenticated access enabling station impersonation and data injection.

Authentication Bypass Mobility46.Se
NVD GitHub
CVE-2026-26305
EPSS 0% CVSS 7.5
HIGH This Week

Mobility46.Se's WebSocket API fails to implement authentication rate limiting, enabling remote attackers to launch denial-of-service attacks against charger telemetry systems or conduct brute-force attacks to compromise accounts. The vulnerability requires no authentication or user interaction and affects all network-accessible instances. No patch is currently available.

Authentication Bypass Mobility46.Se
NVD GitHub
CVE-2026-22878
EPSS 0% CVSS 6.5
MEDIUM This Month

Mobility46.Se charging stations expose authentication credentials through publicly accessible web-based mapping platforms, allowing unauthenticated attackers to obtain sensitive authentication data. This disclosure could enable unauthorized access to charging infrastructure and associated user accounts. No patch is currently available to address this exposure.

Authentication Bypass Mobility46.Se
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy