<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ics — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ics/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ics/feed.xml" rel="self" type="application/rss+xml"/><item><title>ABB System 800xA and Symphony Plus IEC 61850 Denial-of-Service Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-iec61850-dos/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-iec61850-dos/</guid><description>A vulnerability in ABB's IEC 61850 communication stack allows a remote attacker with access to the IEC 61850 network to cause a denial-of-service condition by sending a specially crafted packet, leading to device faults or communication driver crashes.</description><content:encoded><![CDATA[<p>ABB System 800xA and Symphony Plus IEC 61850 products are vulnerable to a denial-of-service attack due to improper validation of input within the IEC 61850 communication stack. This affects specific modules within the AC800M, Symphony Plus SD Series, Symphony Plus MR, and S+ Operations product lines. An attacker with network access to the IEC 61850 network can exploit this vulnerability by sending a specially crafted 61850 packet. The exploitation leads to device faults in PM 877, CI850, and CI868 modules, requiring manual restarts, or causes unavailability of the S+ Operations 61850 connectivity due to communication driver crashes. The System 800xA IEC61850 Connect is not affected by this vulnerability. This issue was reported to ABB by Hitachi Energy and affects firmware versions prior to the patched releases detailed in ABB&rsquo;s advisory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains network access to the targeted IEC 61850 network.</li>
<li>Attacker identifies a vulnerable ABB device (PM 877, CI850, CI868 modules, or S+ Operations node).</li>
<li>Attacker crafts a malicious IEC 61850 packet specifically designed to exploit the input validation vulnerability (CVE-2025-3756).</li>
<li>Attacker sends the crafted packet to the targeted vulnerable ABB device via the IEC 61850 network.</li>
<li>The vulnerable device processes the malicious packet.</li>
<li>Due to the input validation flaw, the processing of the crafted packet triggers a fault condition in PM 877, CI850, or CI868 modules, or a crash in the S+ Operations IEC 61850 communication driver.</li>
<li>The affected module or node becomes unavailable, resulting in a denial-of-service.</li>
<li>For PM 877, CI850, and CI868 modules, manual restart of the device is required to restore functionality. S+ Operations requires restarting the IEC 61850 communication driver.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can disrupt critical industrial control processes. Affected sectors include Chemical, Critical Manufacturing, Energy, and Water/Wastewater. A successful attack can lead to temporary loss of control and monitoring capabilities, potentially causing process disruptions, safety incidents, or environmental damage. The vulnerability affects devices deployed worldwide. While the S+ Operations node&rsquo;s overall functionality remains available, the loss of IEC 61850 communication can still impede operations relying on this protocol.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply vendor-provided patches to affected ABB System 800xA and Symphony Plus IEC 61850 products as soon as they are available. Refer to ABB&rsquo;s advisory for specific version information and patch availability.</li>
<li>Segment and isolate IEC 61850 networks using firewalls to prevent unauthorized access and lateral movement. Implement strict access control policies to limit access to these networks.</li>
<li>Monitor network traffic for suspicious IEC 61850 packets that may indicate exploitation attempts. Create network connection rules to only allow traffic from known good IEC 61850 clients.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious IEC 61850 Traffic&rdquo; to detect potential exploitation attempts based on unexpected network activity.</li>
<li>Enable and review firewall logs to identify and block potentially malicious traffic attempting to reach vulnerable ABB devices.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>denial-of-service</category><category>industrial-control-system</category><category>iec61850</category></item><item><title>ABB PCM600 Path Traversal Vulnerability (CVE-2018-1002208)</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-pcm600-path-traversal/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-pcm600-path-traversal/</guid><description>A path traversal vulnerability in ABB PCM600 versions 1.5 to 2.13 (CVE-2018-1002208) allows a local attacker with low privileges to execute arbitrary code by sending a specially crafted message to the system node.</description><content:encoded><![CDATA[<p>ABB PCM600 versions 1.5 through 2.13 are vulnerable to a path traversal flaw (CVE-2018-1002208) within the SharpZip.dll library. Successful exploitation enables a local attacker with low privileges to execute arbitrary code on the affected system. This vulnerability resides in the software used to configure and manage protection and control IEDs (Intelligent Electronic Devices) in critical infrastructure sectors, specifically critical manufacturing. ABB recommends updating to PCM600 version 2.14 to remediate this vulnerability. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains low-privilege access to the target system running a vulnerable ABB PCM600 version.</li>
<li>The attacker crafts a malicious message containing a path traversal payload designed to exploit CVE-2018-1002208.</li>
<li>The attacker sends the crafted message to the system node, targeting the vulnerable SharpZip.dll.</li>
<li>The SharpZip.dll processes the message without properly sanitizing the provided path.</li>
<li>The path traversal vulnerability allows the attacker to write arbitrary files to locations outside the intended directory.</li>
<li>The attacker leverages the file write capability to place a malicious executable or library in a trusted location.</li>
<li>The attacker triggers the execution of the malicious code, achieving arbitrary code execution on the system.</li>
<li>The attacker can then perform actions such as escalating privileges, installing malware, or disrupting industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2018-1002208 can lead to arbitrary code execution on systems running vulnerable ABB PCM600 versions within critical manufacturing environments. While no specific victim counts or sectors are detailed in the advisory, the vulnerability&rsquo;s presence in industrial control systems poses a significant risk. A successful attack could disrupt manufacturing processes, cause equipment damage, or lead to data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to ABB Protection and control IED manager PCM600 version 2.14 to address CVE-2018-1002208 as per the vendor&rsquo;s recommendation.</li>
<li>If using RE_630 protection relays with older PCM600 versions, implement system-level defenses as described in ABB&rsquo;s security advisory 2NGA002813.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet, as recommended by CISA.</li>
<li>Monitor file creation events for suspicious file paths that may indicate path traversal attempts exploiting CVE-2018-1002208, using a rule similar to the example provided.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>ics</category><category>path traversal</category><category>industrial control system</category></item><item><title>ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-awin-gateways/</guid><description>Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).</description><content:encoded><![CDATA[<p>ABB AWIN Gateways are vulnerable to multiple security flaws that could be exploited by unauthenticated attackers. These vulnerabilities impact ABB AWIN GW100 rev.2 and GW120 devices running specific firmware versions (2.0-0, 2.0-1, 1.2-0, and 1.2-1). Successful exploitation of these vulnerabilities can lead to a denial-of-service condition via remote reboot or the disclosure of sensitive system configuration information, potentially compromising critical manufacturing infrastructure. The vulnerabilities stem from authentication bypass and missing authentication for critical functions. Firmware versions 2.1-0 for GW100 rev. 2 and 2.0-0 for GW120 address these issues.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an exposed ABB AWIN Gateway on a network (likely adjacent network).</li>
<li>Attacker sends a crafted, unauthenticated request to the targeted gateway to trigger CVE-2025-13778.</li>
<li>The ABB AWIN Gateway processes the request without authentication.</li>
<li>The gateway initiates a reboot, causing a denial-of-service condition.</li>
<li>Alternatively, the attacker sends another crafted, unauthenticated request to trigger CVE-2025-13777 or CVE-2025-13779.</li>
<li>The gateway responds to the request, disclosing sensitive system configuration information.</li>
<li>The attacker uses the disclosed information to gain further insight into the network and potentially plan further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have significant impacts, particularly within critical manufacturing sectors where these gateways are deployed. A remote reboot (CVE-2025-13778) can disrupt operations, leading to production downtime and financial losses. Disclosure of sensitive system configuration information (CVE-2025-13777, CVE-2025-13779) can provide attackers with valuable insights, enabling them to plan further attacks, such as gaining unauthorized access to other systems or manipulating industrial processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch affected ABB AWIN Gateways to the fixed versions (ABB AWIN Firmware 2.1-0 installed on ABB AWIN GW100 rev. 2 and ABB AWIN Firmware 2.0-0 installed on ABB AWIN GW120) as recommended in the ABB PSIRT security advisory 4JNO000329.</li>
<li>Minimize network exposure for all control system devices and systems, ensuring they are not accessible from the internet as recommended by CISA.</li>
<li>Monitor network traffic for unauthenticated requests to ABB AWIN Gateways, specifically targeting endpoints related to system reboot or configuration retrieval using the provided Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ics</category><category>vulnerability</category><category>industrial_control_systems</category></item><item><title>ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-abb-symphony-vulns/</guid><description>Multiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.</description><content:encoded><![CDATA[<p>ABB Ability Symphony Plus Engineering versions 2.2 through 2.4 SP2 are susceptible to multiple vulnerabilities originating in the included PostgreSQL database. An attacker gaining access to the S+ Client Server network could exploit CVE-2023-5869 (Integer Overflow), CVE-2023-39417 (SQL Injection), and CVE-2024-7348 (TOCTOU race condition) to execute arbitrary code and potentially compromise the entire ABB system. This poses a significant risk to organizations in critical infrastructure sectors, including Chemical, Critical Manufacturing, Energy, and Water/Wastewater, as these systems are vital for operational control and safety. Successful exploitation could result in loss of control, data breaches, or disruption of essential services. ABB released S+ Engineering 2.4 SP2 RU1 in December 2024 as a fix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target network, specifically the S+ Client Server network, possibly through existing vulnerabilities or misconfigurations.</li>
<li>Attacker authenticates to the PostgreSQL database server used by ABB Ability Symphony Plus Engineering.</li>
<li>Attacker exploits CVE-2023-5869 by providing crafted data to trigger an integer overflow, enabling arbitrary code execution.</li>
<li>Alternatively, the attacker exploits CVE-2023-39417 by injecting malicious SQL code through extension scripts, leading to arbitrary code execution with administrator privileges.</li>
<li>Alternatively, the attacker exploits CVE-2024-7348, leveraging a TOCTOU race condition to execute arbitrary SQL functions with elevated privileges using a PostgreSQL utility.</li>
<li>The attacker executes arbitrary code within the context of the compromised ABB Ability Symphony Plus Engineering application or the underlying PostgreSQL database.</li>
<li>The attacker leverages the compromised system to move laterally within the OT network, potentially targeting other critical systems or data repositories.</li>
<li>Attacker achieves complete compromise of the ABB Ability Symphony Plus Engineering system, allowing manipulation of industrial processes, data exfiltration, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in ABB Ability Symphony Plus Engineering can have severe consequences, particularly in critical infrastructure sectors. Affected sectors include chemical, critical manufacturing, energy, and water/wastewater facilities worldwide. A compromised system could allow attackers to manipulate industrial processes, leading to equipment damage, environmental incidents, or disruption of essential services like power generation or water treatment. The vulnerabilities could allow attackers to gain unauthorized access to sensitive data, intellectual property, or control systems, resulting in significant financial losses, reputational damage, and potential safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade ABB Ability Symphony Plus Engineering to version 2.4 SP2 RU1 (re-leased in December 2024) or later, as recommended by ABB, to address the identified vulnerabilities (Vendor fix).</li>
<li>Review and enforce network segmentation and firewall configurations to restrict access to the S+ client/server network, mitigating the risk of external attackers exploiting these vulnerabilities (Mitigation).</li>
<li>Monitor network traffic for suspicious activity indicative of PostgreSQL exploitation attempts. Deploy the Sigma rule <code>Detect Suspicious PostgreSQL Utility Execution</code> to identify potential exploitation of CVE-2024-7348.</li>
<li>Enable logging of PostgreSQL queries and analyze logs for SQL injection attempts, specifically looking for suspicious use of extension scripts. Deploy the Sigma rule <code>Detect SQL Injection in PostgreSQL Logs</code> to identify potential exploitation of CVE-2023-39417.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>ics</category><category>postgresql</category></item><item><title>ABB Ability OPTIMAX Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-optimax-auth-bypass/</guid><description>CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.</description><content:encoded><![CDATA[<p>A critical vulnerability, CVE-2025-14510, affects ABB Ability OPTIMAX versions that utilize Azure Active Directory (Azure AD) for Single-Sign On (SSO) authentication. This flaw stems from an incorrect implementation of the authentication algorithm, potentially allowing attackers to bypass the Azure AD authentication mechanism and gain unauthorized access to the OPTIMAX system. The affected versions include ABB Ability OPTIMAX 6.1 and 6.2 (all versions), 6.3 versions prior to 6.3.1-251120, and 6.4 versions prior to 6.4.1-251120. Successful exploitation could lead to significant disruption in energy, water, and wastewater sectors. The vulnerability was reported to CISA by ABB PSIRT.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an ABB Ability OPTIMAX installation using Azure AD SSO with a vulnerable version (6.1, 6.2, 6.3 &lt; 6.3.1-251120, or 6.4 &lt; 6.4.1-251120).</li>
<li>The attacker crafts a malicious authentication request, exploiting the incorrect implementation of the authentication algorithm (CWE-303).</li>
<li>The crafted request bypasses the expected Azure AD authentication checks within OPTIMAX.</li>
<li>OPTIMAX incorrectly validates the attacker&rsquo;s session, granting them access to the system.</li>
<li>The attacker leverages their unauthorized access to gain control over OPTIMAX functionalities.</li>
<li>The attacker can then modify control parameters, manipulate data, or disrupt operations within the connected industrial processes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-14510 enables unauthorized access to ABB Ability OPTIMAX systems, potentially leading to severe consequences in critical infrastructure sectors such as energy, water, and wastewater. An attacker could manipulate industrial processes, disrupt critical services, or cause significant financial and operational damage. Given the widespread deployment of ABB Ability OPTIMAX systems globally, a successful campaign exploiting this vulnerability could have far-reaching impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update ABB Ability OPTIMAX to fixed versions (6.3.1-251120 and later) to remediate CVE-2025-14510.</li>
<li>Refer to ABB PSIRT security advisory 9AKK108472A1331 for detailed mitigation steps and recommendations.</li>
<li>Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet, as per CISA&rsquo;s recommended practices.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>ics</category><category>vulnerability</category></item><item><title>Hirschmann HiEOS HTTP(S) Management Module Authentication Bypass (CVE-2024-14034)</title><link>https://feed.craftedsignal.io/briefs/2026-04-hieos-auth-bypass/</link><pubDate>Thu, 02 Apr 2026 20:16:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-hieos-auth-bypass/</guid><description>Hirschmann HiEOS devices contain an authentication bypass vulnerability (CVE-2024-14034) in the HTTP(S) management module, allowing unauthenticated remote attackers to gain administrative access by sending specially crafted HTTP(S) requests.</description><content:encoded><![CDATA[<p>CVE-2024-14034 describes an authentication bypass vulnerability affecting Hirschmann HiEOS devices. The vulnerability resides within the HTTP(S) management module and allows unauthenticated remote attackers to gain administrative privileges. By sending specially crafted HTTP(S) requests, attackers can bypass authentication checks due to improper handling. This enables them to perform unauthorized actions such as downloading or uploading device configurations and modifying the device firmware. Successful exploitation leads to a complete compromise of the affected HiEOS device.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Hirschmann HiEOS device accessible over the network via HTTP(S).</li>
<li>The attacker crafts a malicious HTTP(S) request designed to exploit the authentication bypass. This request likely targets specific endpoints in the management module.</li>
<li>The attacker sends the crafted HTTP(S) request to the vulnerable HiEOS device.</li>
<li>Due to improper authentication handling, the device incorrectly processes the request, granting the attacker administrative privileges.</li>
<li>The attacker leverages the elevated privileges to download the device configuration, potentially exposing sensitive information.</li>
<li>The attacker modifies the device configuration, injecting malicious settings or backdoors.</li>
<li>The attacker uploads the modified configuration to the HiEOS device, effectively compromising its functionality.</li>
<li>Alternatively, the attacker could use their elevated privileges to upload and install a modified firmware image. This allows complete control over the device and can ensure persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-14034 allows an unauthenticated attacker to gain full administrative control over the targeted Hirschmann HiEOS device. This can lead to device configuration modification, firmware manipulation, and potential disruption of network services relying on the compromised device. Given the nature of HiEOS devices, successful attacks can impact industrial control systems (ICS) and critical infrastructure. A CVSS v3.1 base score of 9.8 reflects the critical severity and potential impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patches or mitigations provided in the Belden Security Bulletin BSECV-2024-02 (reference URL in the References section) to remediate CVE-2024-14034.</li>
<li>Monitor webserver logs for unusual HTTP requests targeting the HiEOS management interface using the Sigma rule &ldquo;Detect Suspicious HiEOS Management Requests&rdquo;.</li>
<li>Implement network segmentation to limit the exposure of HiEOS devices and reduce the potential impact of a successful attack.</li>
<li>Regularly review and update firmware on HiEOS devices to address known vulnerabilities and improve overall security posture.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2024-14034</category><category>hieos</category><category>ics</category></item><item><title>CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)</title><link>https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</link><pubDate>Wed, 25 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-codesys-dos/</guid><description>An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.</description><content:encoded>&lt;p>CVE-2026-3509 describes a format string vulnerability within the Audit Log of the CODESYS Control runtime system. This vulnerability allows an unauthenticated remote attacker to influence the format string of messages processed by the affected system. Successful exploitation of this vulnerability results in a denial-of-service (DoS) condition, impacting the availability of the CODESYS Control runtime system. The vulnerability was reported on March 24, 2026. CODESYS is a popular development…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>codesys</category><category>dos</category><category>cve-2026-3509</category><category>ics</category><category>ot</category></item><item><title>CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS</title><link>https://feed.craftedsignal.io/briefs/2026-03-codesys-vulns/</link><pubDate>Wed, 25 Mar 2026 09:46:08 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-codesys-vulns/</guid><description>Multiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in CODESYS, a software platform widely used for industrial automation. These vulnerabilities, if exploited, could allow a remote attacker to execute arbitrary program code on affected systems and/or cause a denial-of-service (DoS) condition. Given the prevalence of CODESYS in critical infrastructure and manufacturing environments, these vulnerabilities pose a significant risk. Public details are limited, but the potential impact necessitates immediate action from defenders to identify and mitigate potentially vulnerable CODESYS installations. Successful exploitation can lead to significant disruption of industrial processes, data manipulation, and potentially physical damage depending on the affected systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable CODESYS installation accessible over the network (e.g., via Shodan or similar).</li>
<li>Attacker crafts a malicious request specifically targeting one of the CODESYS vulnerabilities. Due to lack of specifics, this step is generic. Example attack vectors could include crafted network packets or malicious project files.</li>
<li>The malicious request is sent to the vulnerable CODESYS service.</li>
<li>The CODESYS service improperly processes the request due to the vulnerability.</li>
<li>This improper processing leads to arbitrary code execution within the context of the CODESYS service.</li>
<li>The attacker executes malicious code to gain control of the CODESYS runtime. This code could install a backdoor, modify control logic, or exfiltrate data.</li>
<li>Alternatively, the malformed request triggers a denial-of-service condition, causing the CODESYS service or the entire system to crash.</li>
<li>The attacker disrupts industrial processes or gains unauthorized access to the industrial control system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these CODESYS vulnerabilities can have severe consequences, including unauthorized access to industrial control systems, disruption of critical infrastructure, data manipulation, and potentially physical damage. The number of affected systems is potentially large, given the widespread use of CODESYS in various sectors including manufacturing, energy, and transportation. A successful attack could lead to significant financial losses, reputational damage, and even safety risks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for suspicious activity targeting CODESYS services. Use the network connection rule below to detect unusual processes connecting to CODESYS ports.</li>
<li>Implement strict network segmentation to limit the exposure of CODESYS installations to external networks.</li>
<li>Since specific CVEs are not available, regularly check the CODESYS website for security updates and apply them immediately.</li>
<li>Investigate any crashes or unexpected behavior of CODESYS services, using process creation logs with the process creation rule below to see if the crash was caused by a malicious process.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>codesys</category><category>vulnerability</category><category>arbitrary-code-execution</category><category>denial-of-service</category><category>ics</category></item><item><title>Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-02-yokogawa-centum-vp-r6-r7/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-yokogawa-centum-vp-r6-r7/</guid><description>Multiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.</description><content:encoded><![CDATA[<p>Yokogawa CENTUM VP is a distributed control system (DCS) used in critical infrastructure sectors such as critical manufacturing, energy, and food and agriculture worldwide. CISA has released an advisory detailing multiple vulnerabilities (CVE-2025-1924, CVE-2025-48019, CVE-2025-48020, CVE-2025-48021, CVE-2025-48022, CVE-2025-48023) affecting the Vnet/IP Interface Package for CENTUM VP R6 (VP6C3300) and R7 (VP7C3300) versions &lt;= R1.07.00. Successful exploitation of these vulnerabilities could allow an attacker to terminate the software stack process, cause a denial-of-service condition, or execute arbitrary code. The vulnerabilities are triggered by receiving maliciously crafted network packets, posing a significant risk to industrial control systems relying on affected versions of Yokogawa CENTUM VP.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable Yokogawa CENTUM VP system running Vnet/IP Interface Package for CENTUM VP R6 or R7 (&lt;=R1.07.00) on the network.</li>
<li>Attacker crafts a malicious network packet specifically designed to exploit one of the identified vulnerabilities (CVE-2025-1924, CVE-2025-48019, CVE-2025-48020, CVE-2025-48021, CVE-2025-48022, CVE-2025-48023).</li>
<li>Attacker sends the malicious packet to the vulnerable system.</li>
<li>If exploiting CVE-2025-1924 (Out-of-bounds Write), the crafted packet triggers an out-of-bounds write, potentially overwriting critical memory regions.</li>
<li>If exploiting CVE-2025-48019, CVE-2025-48020, CVE-2025-48021, or CVE-2025-48022 (Reachable Assertion, Integer Underflow), the crafted packet causes the Vnet/IP software stack process to terminate due to an assertion failure or integer underflow.</li>
<li>If successful, the Vnet/IP communication functions stop, resulting in a denial-of-service condition, impacting the control and monitoring capabilities of the CENTUM VP system.</li>
<li>(Potentially, for CVE-2025-1924) By carefully crafting the malicious packet and exploiting the out-of-bounds write, the attacker may achieve arbitrary code execution on the targeted system.</li>
<li>Attacker could then leverage the code execution to gain further control of the system, potentially disrupting industrial processes or exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities in Yokogawa CENTUM VP R6 and R7 could have significant consequences for organizations in critical infrastructure sectors. A denial-of-service condition can disrupt industrial processes, leading to production losses and potential safety hazards. Arbitrary code execution could allow attackers to gain complete control of the system, potentially leading to sabotage, data theft, or further attacks on the network. Given the widespread deployment of Yokogawa CENTUM VP systems globally, the impact could be significant across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch software R1.08.00 provided by Yokogawa to address the vulnerabilities (CVE-2025-1924, CVE-2025-48019, CVE-2025-48020, CVE-2025-48021, CVE-2025-48022, CVE-2025-48023).</li>
<li>Monitor network traffic for unexpected patterns or malformed packets targeting Yokogawa CENTUM VP systems using network intrusion detection systems (NIDS).</li>
<li>Consult Yokogawa advisory YSAR-26-0002 for detailed mitigation steps and implementation guidance: <a href="https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf">https://web-material3.yokogawa.com/1/39281/files/YSAR-26-0002-E.pdf</a></li>
<li>Implement network segmentation to isolate critical control systems from the broader network to limit the potential impact of a successful attack.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ics</category><category>denial-of-service</category><category>out-of-bounds write</category></item><item><title>Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption</title><link>https://feed.craftedsignal.io/briefs/2026-02-mobility46-vulns/</link><pubDate>Fri, 27 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-mobility46-vulns/</guid><description>Multiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.</description><content:encoded><![CDATA[<p>Mobility46 charging stations are affected by multiple vulnerabilities that could allow attackers to gain unauthorized administrative control or disrupt charging services. These vulnerabilities, identified in all versions of mobility46.se, include missing authentication for critical functions (CVE-2026-27028), improper restriction of excessive authentication attempts (CVE-2026-26305), insufficient session expiration (CVE-2026-27647), and insufficiently protected credentials (CVE-2026-22878). Exploitation could lead to privilege escalation, unauthorized control of charging infrastructure, corruption of charging network data, and denial-of-service conditions. Mobility46 did not respond to CISA&rsquo;s request for coordination. These charging stations are deployed worldwide across the energy and transportation sectors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a Mobility46 charging station&rsquo;s identifier via publicly accessible web-based mapping platforms due to insufficient credential protection (CVE-2026-22878).</li>
<li>Attacker connects to the charging station&rsquo;s OCPP WebSocket endpoint using the discovered charging station identifier, exploiting the lack of authentication mechanisms (CVE-2026-27028).</li>
<li>Attacker issues unauthorized OCPP commands to the charging station, impersonating a legitimate charger due to missing authentication for critical functions (CVE-2026-27028).</li>
<li>Alternatively, the attacker overwhelms the WebSocket API with authentication requests, exploiting the lack of rate limiting and causing a denial-of-service condition (CVE-2026-26305).</li>
<li>Attacker hijacks or shadows a legitimate charging station session by establishing a new connection using the same session identifier, as multiple endpoints are allowed per session (CVE-2026-27647).</li>
<li>The attacker receives backend commands intended for the legitimate charging station, gaining unauthorized control (CVE-2026-27647).</li>
<li>Attacker manipulates charging parameters, disrupts charging services, or corrupts charging network data reported to the backend.</li>
<li>The final objective is to gain unauthorized control of charging infrastructure and disrupt charging services or cause financial and reputational damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could enable attackers to gain unauthorized administrative control over vulnerable charging stations, leading to manipulation of charging parameters and disruption of services. Organizations in the energy and transportation sectors are affected worldwide. The lack of authentication and session management could allow attackers to cause denial-of-service conditions, potentially affecting numerous charging stations simultaneously. This could lead to significant financial losses, reputational damage, and disruption of critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network connections for unusual WebSocket traffic patterns originating from or directed towards the domain mobility46.se to detect potential exploitation attempts (IOC: mobility46.se).</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated WebSocket Connection to Mobility46 Charging Station&rdquo; to identify connections lacking proper authentication. Enable network connection logging for WebSocket traffic (Sigma Rule).</li>
<li>Apply rate limiting measures to the WebSocket API endpoints to mitigate potential denial-of-service attacks resulting from excessive authentication attempts as described in CVE-2026-26305.</li>
<li>Implement robust authentication mechanisms for all WebSocket endpoints to prevent unauthorized station impersonation and data manipulation, addressing CVE-2026-27028.</li>
<li>Investigate and remediate the exposure of charging station authentication identifiers on web-based mapping platforms to prevent unauthorized access, addressing CVE-2026-22878.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>mobility46</category><category>charging-station</category><category>vulnerability</category><category>ics</category></item><item><title>Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-02-pelco-sarix-auth-bypass/</link><pubDate>Fri, 27 Feb 2026 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-pelco-sarix-auth-bypass/</guid><description>An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions &lt;= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.</description><content:encoded>&lt;p>Pelco Sarix Pro 3 Series IP Cameras are affected by an authentication bypass vulnerability (CVE-2026-1241) in their web management interface. The vulnerability stems from inadequate access control enforcement, allowing unauthorized access to certain functionalities without proper authentication. This issue impacts Sarix Professional IMP 3 Series, IXP 3 Series, IBP 3 Series, and IWP 3 Series IP Cameras with firmware versions equal to or less than 02.52. Successful exploitation can lead to…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-1241</category><category>authentication-bypass</category><category>ip-camera</category><category>ics</category></item><item><title>Multiple Vulnerabilities in EV Energy ev.energy Charging Stations</title><link>https://feed.craftedsignal.io/briefs/2026-02-ev-energy-vulns/</link><pubDate>Thu, 26 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-ev-energy-vulns/</guid><description>Multiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in EV Energy ev.energy charging stations, potentially allowing attackers to gain unauthorized administrative control or disrupt charging services. The vulnerabilities, detailed in CISA ICS Advisory ICSA-26-057-07, affect all versions of ev.energy. These vulnerabilities include missing authentication for critical functions (CVE-2026-27772), improper restriction of excessive authentication attempts (CVE-2026-24445), insufficient session expiration (CVE-2026-26290), and insufficiently protected credentials (CVE-2026-25774). Successful exploitation could lead to privilege escalation, unauthorized control of charging infrastructure, and denial-of-service conditions. The affected sectors include Energy and Transportation Systems, with worldwide deployment. The vendor, EV Energy, has not responded to CISA&rsquo;s request for coordination.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Reconnaissance:</strong> An attacker identifies EV Energy ev.energy charging stations that have publicly accessible authentication identifiers via web-based mapping platforms (CVE-2026-25774).</li>
<li><strong>Unauthorized WebSocket Connection:</strong> The attacker connects to the OCPP WebSocket endpoint using a known charging station identifier without proper authentication (CVE-2026-27772).</li>
<li><strong>Session Hijacking:</strong> The attacker exploits the lack of session expiration and predictable session identifiers to hijack a legitimate charging station&rsquo;s session (CVE-2026-26290).</li>
<li><strong>Data Manipulation:</strong> The attacker issues unauthorized OCPP commands, manipulating data sent to the backend and gaining unauthorized control of the charging infrastructure (CVE-2026-27772).</li>
<li><strong>Privilege Escalation:</strong> Through unauthorized access and command execution, the attacker escalates privileges to administrative control over the charging station (CVE-2026-27772).</li>
<li><strong>Denial-of-Service:</strong> Alternatively, the attacker floods the WebSocket API with excessive authentication requests, causing a denial-of-service condition by suppressing or misrouting legitimate charger telemetry (CVE-2026-24445).</li>
<li><strong>Service Disruption:</strong> Legitimate users are unable to use the charging stations due to the attacker&rsquo;s control or the denial-of-service condition.</li>
<li><strong>Network Data Corruption:</strong> The attacker manipulates charging network data reported to the backend, potentially impacting billing or grid management systems (CVE-2026-27772).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to significant disruptions in the Energy and Transportation Systems sectors. An attacker could gain administrative control over charging stations, manipulate charging processes, and cause denial-of-service conditions, rendering the stations unusable. The lack of vendor response further exacerbates the risk, leaving users without official patches or mitigation guidance. The compromise of charging network data could also have downstream impacts on billing and grid management systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement rate limiting on WebSocket authentication requests to mitigate CVE-2026-24445, preventing denial-of-service attacks. Monitor network traffic for excessive authentication attempts targeting OCPP WebSocket endpoints, and deploy a custom rule to detect such attempts.</li>
<li>Disable or restrict public access to web-based mapping platforms that expose charging station authentication identifiers to mitigate CVE-2026-25774. Conduct regular audits of publicly available information to identify and remove exposed credentials.</li>
<li>Deploy network segmentation and firewall rules to minimize network exposure for all charging station devices, as recommended by CISA. This will limit the attack surface and prevent unauthorized access from the Internet.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ev.energy</category><category>charging-station</category><category>ics</category><category>vulnerability</category><category>dos</category></item><item><title>Multiple Vulnerabilities in Chargemap Charging Stations</title><link>https://feed.craftedsignal.io/briefs/2026-02-chargemap-vulns/</link><pubDate>Thu, 26 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-chargemap-vulns/</guid><description>Unauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.</description><content:encoded><![CDATA[<p>Chargemap chargemap.com is affected by multiple critical vulnerabilities that could allow attackers to gain unauthorized administrative control over charging stations or disrupt charging services. These vulnerabilities include missing authentication for critical functions (CVE-2026-25851), improper restriction of excessive authentication attempts (CVE-2026-20792), insufficient session expiration (CVE-2026-25711), and insufficiently protected credentials (CVE-2026-20791). The vulnerabilities affect all versions of Chargemap chargemap.com.  These flaws exist within the WebSocket API and the handling of charging station identifiers. Successful exploitation can lead to privilege escalation, data corruption, session hijacking, and denial-of-service conditions. The affected infrastructure sectors include energy and transportation systems, with deployments worldwide.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a publicly accessible Chargemap charging station identifier via web-based mapping platforms (CVE-2026-20791).</li>
<li>Attacker connects to the OCPP WebSocket endpoint of the targeted charging station using the discovered identifier without authentication (CVE-2026-25851).</li>
<li>Attacker exploits the lack of authentication to impersonate a legitimate charger.</li>
<li>Attacker floods the WebSocket API with authentication requests, leveraging the absence of rate limiting to conduct a denial-of-service attack (CVE-2026-20792).</li>
<li>Attacker hijacks a legitimate charging station session due to insufficient session expiration and predictable session identifiers (CVE-2026-25711).</li>
<li>Attacker sends malicious commands to the backend, disrupting the charging process and potentially damaging connected vehicles.</li>
<li>Attacker manipulates data sent to the backend, corrupting charging network data and potentially causing billing errors or safety issues.</li>
<li>Attacker gains full administrative control over the charging station, enabling them to modify settings, disable functionality, or use it as a pivot point to attack other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in widespread disruption of electric vehicle charging services, financial losses due to manipulated charging data, and potential damage to connected vehicles. Given the global deployment of Chargemap, a successful attack could affect numerous users and organizations in the energy and transportation sectors. Attackers could remotely disable charging stations, manipulate pricing, or even cause physical damage to charging infrastructure.  The lack of vendor response further exacerbates the potential impact, leaving users vulnerable without readily available patches or workarounds.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Minimize network exposure for Chargemap charging stations by ensuring they are not directly accessible from the internet as recommended by CISA.</li>
<li>Locate control system networks and remote devices behind firewalls, isolating them from business networks as per CISA guidance.</li>
<li>Monitor network traffic for excessive authentication attempts targeting Chargemap charging stations to detect potential denial-of-service attacks leveraging CVE-2026-20792. Implement rate limiting where possible.</li>
<li>Deploy the Sigma rule &ldquo;Detect Unauthenticated OCPP WebSocket Connections&rdquo; to identify unauthorized connections to charging stations exploiting CVE-2026-25851.</li>
<li>Contact Chargemap using their contact page (<a href="https://chargemap.com/en-us/support">https://chargemap.com/en-us/support</a>) to inquire about available patches or mitigations for these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ics</category><category>ot</category><category>vulnerability</category><category>denial-of-service</category></item><item><title>Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-02-quantum-hd-vulns/</link><pubDate>Thu, 26 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-quantum-hd-vulns/</guid><description>Multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions &lt;=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in Johnson Controls, Inc. Frick Controls Quantum HD versions 10.22 and earlier. These vulnerabilities, including CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658, CVE-2026-21659, and CVE-2026-21660, can be exploited to achieve pre-authentication remote code execution, information leaks, or denial of service. Given that Frick Controls Quantum HD is deployed worldwide, particularly in the Food and Agriculture sector, these vulnerabilities pose a significant risk. Johnson Controls recommends upgrading to Quantum HD Unity, version 12 or higher, to mitigate these risks. Versions 10.22 through 11 are no longer supported.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable Frick Controls Quantum HD device exposed to the network.</li>
<li>The attacker sends a specially crafted request to the device exploiting the input validation vulnerabilities (CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658).</li>
<li>Due to the insufficient validation of input, the crafted request allows the attacker to inject malicious code into the system (CWE-78, CWE-94).</li>
<li>The injected code is executed by the device, granting the attacker unauthorized access.</li>
<li>The attacker leverages the code execution to perform further actions such as gaining access to sensitive information (information leak), or causing the device to crash (denial of service).</li>
<li>If successful RCE is achieved, the attacker may use this to move laterally within the OT network.</li>
<li>The attacker could then target other critical systems within the food and agriculture environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can lead to severe consequences, especially in critical infrastructure sectors like Food and Agriculture. Attackers could remotely execute arbitrary code on the affected systems without authentication, potentially disrupting industrial processes, stealing sensitive data, or causing a complete shutdown of operations. With Quantum HD systems deployed globally, a widespread attack could affect numerous organizations, leading to significant financial losses and supply chain disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade all Frick Controls Quantum HD devices to the latest platform, Quantum HD Unity, version 12 or higher, as recommended by Johnson Controls (CVE-2026-21654, CVE-2026-21656, CVE-2026-21657, CVE-2026-21658, CVE-2026-21659, CVE-2026-21660).</li>
<li>After upgrading to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.</li>
<li>Monitor network traffic for suspicious requests targeting Frick Controls Quantum HD devices (Network Connection logs).</li>
<li>Refer to Johnson Controls Product Security Advisory JCI-PSA-2026-05 for more detailed mitigation instructions at <a href="https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories">https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories</a>.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>ics</category><category>ot</category><category>vulnerability</category></item><item><title>Copeland XWEB and XWEB Pro Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-02-copeland-xweb-vulns/</link><pubDate>Thu, 26 Feb 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-02-copeland-xweb-vulns/</guid><description>Multiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.</description><content:encoded><![CDATA[<p>Copeland XWEB and XWEB Pro are web-enabled controllers used for managing refrigeration and HVAC systems in commercial facilities worldwide. CISA has released an advisory detailing multiple critical vulnerabilities affecting versions 1.12.1 and earlier of XWEB 300D PRO, XWEB 500D PRO, and XWEB 500B PRO. These vulnerabilities, including authentication bypasses (CVE-2026-25085, CVE-2026-21718), OS command injection flaws (CVE-2026-24663, CVE-2026-21389), and others, can be exploited to achieve unauthenticated remote code execution, denial-of-service, and information disclosure. The vulnerabilities pose a significant risk to organizations using these controllers, potentially leading to disruption of critical infrastructure, data breaches, and financial losses. Immediate patching is strongly advised.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a specially crafted request to the <code>/libraries/install</code> endpoint (CVE-2026-24663).</li>
<li>The request contains malicious input designed to inject OS commands.</li>
<li>The XWEB Pro application fails to properly sanitize the input.</li>
<li>The application executes the injected OS commands on the underlying system.</li>
<li>The attacker gains arbitrary code execution with the privileges of the web server process.</li>
<li>The attacker uses their initial access to further compromise the system.</li>
<li>The attacker may install malware, establish persistence, or move laterally to other systems on the network.</li>
<li>The final objective is to disrupt the managed refrigeration and HVAC systems by manipulating configuration or process control logic.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication, cause a denial-of-service condition, cause memory corruption, and execute arbitrary code. Given the widespread use of Copeland XWEB and XWEB Pro in commercial facilities, a successful attack could disrupt critical refrigeration systems, potentially impacting food safety, pharmaceuticals, and other temperature-sensitive industries. A successful attack against these systems can allow a malicious actor to cause significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch Copeland XWEB Pro to the latest version by using the software update page: <a href="https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate">https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate</a>.</li>
<li>Monitor network traffic for unusual requests to the <code>/libraries/install</code> and <code>/contacts/import</code> endpoints, as these are targets for command injection (CVE-2026-24663, CVE-2026-21389).</li>
<li>Implement network segmentation to isolate XWEB Pro devices from other critical systems, limiting the potential impact of a successful exploit.</li>
<li>Deploy the following Sigma rules to detect exploitation attempts targeting these vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>copeland</category><category>xweb</category><category>vulnerability</category><category>ics</category></item></channel></rss>