Plattform
linux
Komponente
everest
Behoben in
2026.02.0
CVE-2026-23995 addresses a critical Buffer Overflow vulnerability identified in EVerest, an EV charging software stack. Prior to version 2026.02.0, the software exhibits a flaw in its CAN interface initialization process. Specifically, passing an interface name exceeding the IFNAMSIZ limit (16 characters) to CAN open routines results in an overflow of the ifreq.ifr_name buffer, potentially corrupting adjacent stack data and enabling code execution. This vulnerability can be triggered by a malicious or misconfigured interface name, even before privilege checks are performed.
The buffer overflow allows an attacker to overwrite critical data on the stack, potentially hijacking the control flow of the EVerest software. By crafting a malicious interface name exceeding 16 characters, an attacker can trigger the overflow and inject their own code. Successful exploitation could lead to arbitrary code execution on the system running the EVerest software, granting the attacker control over the charging infrastructure. The potential impact is severe, as it could compromise the security of the entire EV charging network and potentially impact the safety of electric vehicle charging operations. This vulnerability is particularly concerning due to its lack of privilege checks before the vulnerable function is called.
CVE-2026-23995 was published on 2026-03-26. The vulnerability's exploitation probability is considered medium, given the technical expertise required to craft a malicious interface name and the need for access to the system's CAN interface. There are currently no publicly known Proof-of-Concept (POC) exploits. The vulnerability is not listed on KEV or EPSS as of this writing. Refer to the NVD and CISA advisories for updates.
Organizations deploying Everest-Core for EV charging infrastructure, particularly those using Linux-based systems, are at risk. Legacy deployments with older, unpatched versions of Everest-Core are especially vulnerable. Shared hosting environments where multiple users can configure CAN interfaces also present a heightened risk.
• linux / server:
journalctl -u everest-core -g "CAN interface initialization"• linux / server:
ps aux | grep everest-core | grep -i can• linux / server:
ls -l /dev/can* | awk '{print length($NF)}' | grep -E '^[1-9][0-9]+$' # Check for CAN interface names longer than 1 digitdisclosure
Exploit-Status
EPSS
0.01% (2% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-23995 is to upgrade EVerest to version 2026.02.0 or later, which includes a patch addressing the buffer overflow. If an immediate upgrade is not possible, implement strict input validation on all interface names passed to the CAN open routines. Limit the length of interface names to a maximum of 15 characters to prevent the overflow. Consider implementing a Web Application Firewall (WAF) to filter out malicious interface names. After upgrading, confirm the fix by attempting to initialize the CAN interface with a name exceeding 16 characters and verifying that the software handles the input gracefully without crashing or exhibiting unexpected behavior.
Actualice EVerest a la versión 2026.02.0 o posterior. Esta versión contiene una corrección para el desbordamiento de búfer basado en pila en la inicialización de la interfaz CAN.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-23995 is a buffer overflow vulnerability in Everest-Core versions prior to 2026.02.0. A long CAN interface name can overwrite stack data, potentially leading to code execution.
You are affected if you are running Everest-Core versions 2026.02.0 or earlier on a Linux system. Check your version and upgrade immediately.
Upgrade to Everest-Core version 2026.02.0 or later. As a temporary workaround, restrict CAN interface names to 16 characters or less.
Currently, there are no confirmed reports of active exploitation, but the vulnerability's nature suggests a potential risk.
Refer to the official Everest-Core documentation and security advisories on the vendor's website for the most up-to-date information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.