{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T12:14:35.184","vulnerabilities":[{"cve":{"id":"CVE-2025-68136","sourceIdentifier":"security-advisories@github.com","published":"2026-01-21T20:16:05.677","lastModified":"2026-02-06T21:21:48.500","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SDP request, it creates a whole new set of objects like `Session`, `IConnection` which open new TCP socket for the ISO15118-20 communications and registers callbacks for the created file descriptor, without closing and destroying the previous ones. Previous `Session` is not saved and the usage of an `unique_ptr` is lost, destroying connection data. Latter, if the used socket and therefore file descriptor is not the last one, it will lead to a null pointer dereference. Version 2025.10.0 fixes the issue."},{"lang":"es","value":"EVerest es una pila de software de carga de VE. Antes de la versión 2025.10.0, una vez que el módulo recibe una solicitud SDP, crea un conjunto completamente nuevo de objetos como 'Session', 'IConnection' que abren un nuevo socket TCP para las comunicaciones ISO15118-20 y registra retrollamadas para el descriptor de archivo creado, sin cerrar y destruir los anteriores. La 'Session' anterior no se guarda y el uso de un 'unique_ptr' se pierde, destruyendo los datos de conexión. Posteriormente, si el socket utilizado y, por lo tanto, el descriptor de archivo no es el último, esto conducirá a una desreferenciación de puntero nulo. La versión 2025.10.0 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linuxfoundation:everest:*:*:*:*:*:*:*:*","versionEndExcluding":"2025.10.0","matchCriteriaId":"94E1768A-FED9-477E-A4B7-99FD10058D23"}]}]}],"references":[{"url":"https://github.com/EVerest/everest-core/security/advisories/GHSA-4h8h-x5cp-g22r","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}