#we_inform_the_uninformed .
Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging stations and even expose them to data and energy theft.
The findings, which come from Israel-based SaiFlow, once again demonstrate the potential risks facing the EV charging infrastructure.
The issues have been identified in version 1.6J of the Open Charge Point Protocol (OCPP) standard that uses WebSockets for communication between EV charging stations and the Charging Station Management System (CSMS) providers. The current version of OCPP is 2.0.1.
โThe OCPP standard doesnโt define how a CSMS should accept new connections from a charge point when there is already an active connection,โ SaiFlow researchers Lionel Richard Saposnik and Doron Porat said.
โThe lack of a clear guideline for multiple active connections can be exploited by attackers to disrupt and hijack the connection between the charge point and the CSMS.โ
This also means that a cyber attacker could spoof a connection from a valid charger to its CSMS provider when itโs already connected, effectively leading to either of the two scenarios:
A denial-of-service (DoS) condition that arises when the CSMS provider closes the original WebSocket connection when a new connection is established
Information theft that stems from keeping the two connections alive but returning responses to the โnewโ rogue connection, permitting the adversary to access the driverโs personal data, credit card details, and CSMS credentials.
The forging is made possible owing to the fact that CSMS providers are configured to solely rely on the charging point identity for authentication.
โCombining the mishandling of new connections with the weak OCPP authentication and chargers identities policy could lead to a vast Distributed DoS (DDoS) attack on the [Electric Vehicle Supply Equipment] network,โ the researchers said.
EV Charging Station
OCPP 2.0.1 remediates the weak authentication policy by requiring charging point credentials, thereby closing out the loophole. That said, mitigations for when there are more than one connection from a single charging point should necessitate validating the connections by sending a ping or a heartbeat request, SaiFlow noted.
โIf one of the connections is not responsive, the CSMS should eliminate it,โ the researchers explained. โIf both connections are responsive, the operator should be able to eliminate the malicious connection directly or via a CSMS-integrated cybersecurity module.โ
Source; THN.
๐ธ: Some of the angry Youths displaying placards as others walked in to stop the ongoing meeting by Maracha District officials. Story by Osuta Yusuf. Maracha District. 3-February-2025. ๐ธ: Kololo Public Seed Secondary School whose construction project has again stalled. Photo by Osuta Yusuf, Our News Reporter. The angry youths from Vurra Parish, Tara Sub-county in Maracha East constituency, Maracha District have on Monday 3-Feb-2025 chased the entire Maracha District officials out of a site meeting in Kololo Seed Secondary over allegations of corruption stemming from the stalled seed school construction project. Key Maracha District officials who went for the site meeting on Monday 3-Feb-2025 include, the Security department headed by the deputy RDC Koliba Monica Kotevu and Assistant RDC Collins Dramani, the LC5 Chairperson Hon Obitre Stephen together with his DEC Councilors, the accounting / technical department headed by the CAO Mr Olila Patrick, the Engi...
Comments
Post a Comment