HomeLinuxfoundationCVE-2026-26072

CVE-2026-26072

MEDIUM
4.2CVSS
Published: 2026-03-26
Updated: 2026-03-31
AI Analysis

Description

EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to `std::map<std::optional>` concurrent access (container/optional corruption possible). The trigger is EV SoC update with powermeter periodic update and unplugging/SessionFinished status. Version 2026.02.0 patches the issue.

CVSS Metrics

Vector
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
physical
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-362

Metadata

Primary Vendor
LINUXFOUNDATION
Published
3/26/2026
Last Modified
3/31/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

linuxfoundation : everest

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-26072 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com