Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5539: CWE-863 Incorrect Authorization in Automated Logic WebCTRL

0
Critical
VulnerabilityCVE-2024-5539cvecve-2024-5539cwe-863
Published: Thu Nov 27 2025 (11/27/2025, 01:02:30 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL

Description

The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in versions up to and including 8.5 allows a malicious actor to bypass intended access restrictions and expose sensitive information via the web based building automation server.

AI-Powered Analysis

AILast updated: 12/04/2025, 04:23:25 UTC

Technical Analysis

CVE-2024-5539 is an access control bypass vulnerability classified under CWE-863, affecting Automated Logic's WebCTRL and Carrier i-Vu building automation systems up to and including version 8.5. The vulnerability allows an unauthenticated attacker to circumvent intended authorization mechanisms on the web-based building automation server, thereby exposing sensitive information. The flaw resides in the incorrect enforcement of access restrictions, enabling attackers to access data or functionality that should be protected. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N) indicates that the attack can be performed remotely over the network without any authentication or user interaction, with a high impact on confidentiality and system control. Although no public exploits have been reported yet, the critical severity score of 9.2 reflects the potential for significant data exposure and operational risk. Building automation systems like WebCTRL and i-Vu are integral to managing HVAC, lighting, and other critical building functions, making this vulnerability a serious concern for facility security and operational continuity. The lack of available patches at the time of reporting necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of building automation data. Unauthorized access could lead to exposure of sensitive operational information, potentially enabling further attacks or espionage. Disruption or manipulation of building management systems could also impact availability indirectly by causing operational issues. Critical infrastructure facilities, commercial real estate, hospitals, and government buildings using these systems are at heightened risk. The exposure of sensitive data could lead to regulatory compliance violations under GDPR, resulting in legal and financial penalties. Additionally, attackers gaining insight into building operations could facilitate physical security breaches or sabotage. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where these systems are accessible from less secure networks or the internet.

Mitigation Recommendations

Organizations should immediately audit their network architecture to ensure that WebCTRL and Carrier i-Vu management interfaces are not exposed to untrusted networks or the internet. Implement strict network segmentation and firewall rules to restrict access to these systems only to authorized personnel and trusted network segments. Employ VPNs or zero-trust network access solutions for remote management. Monitor network traffic and logs for unusual access patterns or unauthorized attempts to reach the building automation servers. Once available, apply vendor patches or updates promptly to remediate the vulnerability. In the absence of patches, consider deploying web application firewalls (WAFs) with custom rules to detect and block unauthorized access attempts. Conduct regular security assessments and penetration testing focused on building automation systems. Educate facility management teams about the risks and ensure strong password policies and multi-factor authentication where supported.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Carrier
Date Reserved
2024-05-30T17:38:43.955Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6927a51dd322a87b22026c09

Added to database: 11/27/2025, 1:10:53 AM

Last enriched: 12/4/2025, 4:23:25 AM

Last updated: 1/11/2026, 6:14:42 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats