Vulnerability Description
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or misrouting legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chargemap | Chargemap.Com | All versions |
Related Weaknesses (CWE)
References
- https://chargemap.com/en-us/supportProduct
- https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-05Third Party Advisory
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-05Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2026-20792?
CVE-2026-20792 is a vulnerability with a CVSS score of 7.5 (HIGH). The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks ...
How severe is CVE-2026-20792?
CVE-2026-20792 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-20792?
Check the references section above for vendor advisories and patch information. Affected products include: Chargemap Chargemap.Com.