CVE-2025-68136

Source
https://cve.org/CVERecord?id=CVE-2025-68136
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68136.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68136
Aliases
  • GHSA-4h8h-x5cp-g22r
Published
2026-01-21T19:18:21.068Z
Modified
2026-03-13T03:42:37.425180Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H CVSS Calculator
Summary
EVerest's inadequate session handling can lead to memory-related errors or exhaustion of the operating system’s file descriptors, resulting in a denial of service
Details

EVerest is an EV charging software stack. Prior to version 2025.10.0, once the module receives a SDP request, it creates a whole new set of objects like Session, IConnection which open new TCP socket for the ISO15118-20 communications and registers callbacks for the created file descriptor, without closing and destroying the previous ones. Previous Session is not saved and the usage of an unique_ptr is lost, destroying connection data. Latter, if the used socket and therefore file descriptor is not the last one, it will lead to a null pointer dereference. Version 2025.10.0 fixes the issue.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68136.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-770"
    ]
}
References

Affected packages

Git / github.com/everest/everest-core

Affected ranges

Type
GIT
Repo
https://github.com/everest/everest-core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2025.10.0"
        }
    ]
}

Affected versions

2022.*
2022.12.0
2022.12.1
2023.*
2023.1.0
2023.10.0
2023.12.0
2023.2.0
2023.2.1
2023.3.0
2023.5.0
2023.6.0
2023.7.0
2023.8.0
2023.9.0
2023.9.1
2024.*
2024.1.0
2024.10.0
2024.11.0
2024.2.0
2024.3.0-rc1
2024.4.0
2024.5.0
2024.6.0-rc1
2024.6.0-rc2
2024.7.0
2024.7.1
2024.8.0
2024.9.0-rc1
2025.*
2025.1.0-rc1
2025.1.0-rc2
2025.2.0
2025.3.0
2025.4.0-rc1
2025.5.0
2025.6.0
2025.7.0
2025.7.0-rc1
2025.8.0
2025.9.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68136.json"
vanir_signatures
[
    {
        "source": "https://github.com/everest/everest-core/commit/c86cd9c0ada60b5797f574fd484eae4d8330017d",
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2025-68136-aed155c7",
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "243003712789178062503146303338281965718",
                "28960150712886505085483741986671241515",
                "168243888782963850779708053776925040017",
                "301503089711335497483477796302426921625",
                "266559291961740525977226234582463159260",
                "14112705696940663726721188972121718934",
                "229722161894950827463204315700879441599",
                "171855750029820596888200642603912303410",
                "1847160579080647096042318630878208024"
            ]
        },
        "signature_type": "Line",
        "target": {
            "file": "modules/EVSE/Auth/tests/auth_tests.cpp"
        }
    },
    {
        "source": "https://github.com/everest/everest-core/commit/c86cd9c0ada60b5797f574fd484eae4d8330017d",
        "deprecated": false,
        "signature_version": "v1",
        "id": "CVE-2025-68136-e210278c",
        "digest": {
            "length": 1807.0,
            "function_hash": "274524476206042087287404301418060636027"
        },
        "signature_type": "Function",
        "target": {
            "file": "modules/EVSE/Auth/tests/auth_tests.cpp",
            "function": "TEST_F"
        }
    }
]