Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://cds.thalesgroup.com/en |
|
Fri, 09 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
|
| Vendors & Products |
Efacec
Efacec qc 120 Efacec qc 60 Efacec qc 90 |
Wed, 07 Jan 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6. | |
| Title | INFORMATION DISCLOSURE VIA CURL REQUESTS (OCPP) | |
| Weaknesses | CWE-201 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: S21sec
Published:
Updated: 2026-01-09T19:09:20.052Z
Reserved: 2026-01-07T14:01:04.828Z
Link: CVE-2026-22539
Updated: 2026-01-09T19:09:16.715Z
Status : Deferred
Published: 2026-01-07T18:15:55.537
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-22539
No data.
OpenCVE Enrichment
Updated: 2026-04-18T17:00:05Z