Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

An 18-Year-Old Codebase Left Smart Buildings Wide Open

0
Medium
Vulnerability
Published: Thu Oct 30 2025 (10/30/2025, 21:37:43 UTC)
Source: Dark Reading

Description

Researcher Gjoko Krstic’s "Project Brainfog" exposed hundreds of zero-day vulnerabilities in building-automation systems still running hospitals, schools, and offices worldwide.

AI-Powered Analysis

AILast updated: 11/01/2025, 01:16:35 UTC

Technical Analysis

Project Brainfog, conducted by researcher Gjoko Krstic, uncovered hundreds of zero-day vulnerabilities in a legacy building automation codebase that has been in use for approximately 18 years. This codebase underpins smart building systems controlling critical infrastructure in hospitals, schools, offices, and other facilities worldwide. The vulnerabilities span a wide range of security issues, potentially allowing attackers to gain unauthorized access, manipulate building controls, disrupt operations, or exfiltrate sensitive data. The age of the codebase suggests that it was developed before modern secure coding practices and threat models were widely adopted, resulting in systemic weaknesses. Although no public patches or fixes have been released yet, and no active exploits have been observed, the exposure of these vulnerabilities highlights a significant risk to operational technology environments. The affected systems are often integrated into critical infrastructure, making them attractive targets for attackers seeking to cause disruption or gain strategic advantages. The lack of detailed affected versions and absence of CVSS scores complicate precise risk quantification, but the medium severity assigned by the source likely reflects the potential for impactful attacks if exploited. The vulnerabilities may not require authentication or user interaction, increasing the ease of exploitation. The research underscores the urgent need for modernization and security hardening of building automation systems.

Potential Impact

For European organizations, the impact of these vulnerabilities could be severe, particularly in sectors such as healthcare, education, and corporate facilities where building automation controls critical environmental and safety systems. Exploitation could lead to unauthorized manipulation of HVAC, lighting, access control, and safety alarms, potentially endangering occupant safety and disrupting essential services. Confidentiality breaches could expose sensitive operational data or personal information. Integrity attacks might alter system configurations or disable safety mechanisms, while availability impacts could cause outages or denial of service in critical facilities. Given the integration of these systems with broader IT and OT networks, a successful attack could serve as a foothold for lateral movement and further compromise. The widespread deployment across Europe means many organizations may be unknowingly vulnerable, increasing the risk of coordinated or opportunistic attacks. The lack of known exploits currently provides a window for proactive mitigation, but the threat remains significant due to the systemic nature of the vulnerabilities and the criticality of affected environments.

Mitigation Recommendations

European organizations should immediately conduct comprehensive security audits of their building automation systems, focusing on identifying legacy components related to the exposed codebase. Network segmentation should be enforced to isolate building automation networks from corporate IT and internet-facing systems, reducing attack surface and lateral movement potential. Deploying strict access controls and multi-factor authentication for management interfaces can limit unauthorized access. Monitoring and anomaly detection tailored to OT environments should be enhanced to detect suspicious activities early. Where possible, organizations should engage with vendors or security researchers to obtain patches or mitigations, or consider upgrading to modern, secure building automation platforms. Incident response plans should be updated to include scenarios involving building automation system compromise. Additionally, organizations should raise awareness among facility management and IT teams about the risks and encourage collaboration to address these vulnerabilities holistically. Given the absence of official patches, compensating controls such as virtual patching via firewalls and intrusion prevention systems should be implemented.

Need more detailed analysis?Get Pro

Threat ID: 69055f4871a6fc4aff35928a

Added to database: 11/1/2025, 1:15:52 AM

Last enriched: 11/1/2025, 1:16:35 AM

Last updated: 11/1/2025, 4:00:42 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats