<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Packet-Forging — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/packet-forging/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 20:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/packet-forging/feed.xml" rel="self" type="application/rss+xml"/><item><title>Contemporary Controls BASC 20T Packet Forging Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-basc-20t-packet-forging/</link><pubDate>Thu, 09 Apr 2026 20:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-basc-20t-packet-forging/</guid><description>CVE-2025-13926 describes a vulnerability in Contemporary Controls BASC 20T that allows an attacker to sniff network traffic and forge packets to make arbitrary requests, potentially leading to unauthorized actions.</description><content:encoded><![CDATA[<p>CVE-2025-13926 is a critical vulnerability affecting Contemporary Controls BASC 20T. An attacker can exploit this vulnerability by capturing network traffic and forging packets, enabling them to send arbitrary requests to the device. This is achieved by sniffing network traffic, extracting necessary data for packet construction, and then crafting malicious packets to interact with the BASC 20T. The vulnerability has a CVSS v3.1 score of 9.8 and a CVSS v4.0 score of 9.3, highlighting the severity and potential impact. Successful exploitation could lead to unauthorized access, modification of settings, or disruption of operations managed by the BASC 20T. This vulnerability was reported by ICS-CERT and assigned CWE-807, which describes reliance on untrusted inputs in a security decision.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker performs network reconnaissance to identify a vulnerable Contemporary Controls BASC 20T device.</li>
<li>Attacker passively sniffs network traffic to and from the BASC 20T device.</li>
<li>The attacker analyzes captured network packets to understand the communication protocol and packet structure used by the BASC 20T.</li>
<li>Attacker identifies fields within the packets that can be manipulated to achieve the desired malicious actions.</li>
<li>The attacker crafts a forged packet with modified fields to perform an arbitrary request (e.g., changing settings, issuing commands).</li>
<li>The attacker injects the forged packet into the network, targeting the BASC 20T device.</li>
<li>The BASC 20T processes the forged packet without proper validation, executing the attacker&rsquo;s arbitrary request.</li>
<li>The attacker gains unauthorized control or access to the BASC 20T, potentially disrupting operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2025-13926 allows an attacker to make arbitrary requests to the Contemporary Controls BASC 20T. This could lead to unauthorized modification of device settings, disruption of critical control processes, or potentially complete device compromise. The affected BASC 20T devices are often used in industrial control systems (ICS), so a successful attack could have significant consequences for the targeted organization, including operational downtime, equipment damage, or safety hazards.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for unusual patterns or malformed packets originating from or directed to Contemporary Controls BASC 20T devices (network_connection category).</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise.</li>
<li>Deploy the Sigma rules provided to detect suspicious network activity related to forged packets targeting BASC 20T devices.</li>
<li>Contact Contemporary Controls for available patches or mitigations for CVE-2025-13926 (references section).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2025-13926</category><category>basc-20t</category><category>packet-forging</category><category>industrial-control-system</category></item></channel></rss>