Description
A vulnerability has been identified in OpenV2G (V0.9.4). The OpenV2G EXI parsing feature is missing a length check when parsing X509 serial numbers. Thus, an attacker could introduce a buffer overflow that leads to memory corruption.
References (1)
Core 1
Core References
Patch, Vendor Advisory x_refsource_misc
https://cert-portal.siemens.com/productcert/pdf/ssa-736385.pdf
Scores
CVSS v3
5.5
EPSS
0.0006
EPSS Percentile
19.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (1)
siemens/openv2g
0.9.4
Published
May 20, 2022
Tracked Since
Feb 18, 2026