Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8527: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Automated Logic WebCtrl

0
High
VulnerabilityCVE-2024-8527cvecve-2024-8527cwe-601
Published: Wed Nov 19 2025 (11/19/2025, 13:17:01 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCtrl

Description

Open Redirect in URL parameter in Automated Logic WebCTRL and Carrier i-Vu versions 6.0, 6.5, 7.0, 8.0, 8.5, 9.0 may allow attackers to exploit user sessions.

AI-Powered Analysis

AILast updated: 11/26/2025, 14:07:53 UTC

Technical Analysis

CVE-2024-8527 is an open redirect vulnerability classified under CWE-601, impacting Automated Logic's WebCTRL and Carrier i-Vu building automation systems across multiple versions (6.0, 6.5, 7.0, 8.0, 8.5, and 9.0). The vulnerability arises from insufficient validation of URL parameters that control redirection destinations, enabling attackers to craft URLs that redirect users to arbitrary, potentially malicious external websites. This flaw does not require authentication or user interaction, increasing its exploitation potential. The vulnerability can be leveraged to hijack user sessions, facilitate phishing campaigns by redirecting legitimate users to attacker-controlled sites, or bypass security mechanisms relying on trusted domains. The CVSS 4.0 vector indicates local attack vector but low complexity and no privileges or user interaction needed, with high impacts on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability's presence in widely used building management systems poses a significant risk to operational technology environments. The lack of available patches at the time of publication necessitates immediate risk mitigation through compensating controls and monitoring.

Potential Impact

For European organizations, especially those operating critical infrastructure such as commercial buildings, data centers, and industrial facilities, this vulnerability could lead to unauthorized redirection of users to malicious sites, potentially resulting in credential theft, session hijacking, or malware delivery. The compromise of building automation systems could disrupt facility operations, degrade safety controls, or lead to unauthorized access to sensitive operational data. Given the integration of these systems in energy management and HVAC controls, exploitation could indirectly affect availability and safety. The high CVSS score reflects the potential for significant confidentiality and integrity breaches without requiring authentication or user interaction, increasing the risk profile for organizations relying on these systems. The absence of known exploits currently provides a window for proactive defense, but the vulnerability's nature makes it attractive for phishing and social engineering attacks targeting facility operators and administrators.

Mitigation Recommendations

Organizations should immediately audit their use of Automated Logic WebCTRL and Carrier i-Vu systems to identify affected versions. Until official patches are released, implement strict input validation and sanitization on URL parameters at the web application or reverse proxy level to prevent open redirects. Deploy web application firewalls (WAFs) configured to detect and block suspicious redirect patterns. Educate users and administrators about the risks of phishing and suspicious URLs originating from these systems. Monitor network traffic and logs for unusual redirection attempts or external connections initiated from the affected systems. Segregate building automation networks from corporate IT networks to limit exposure. Engage with the vendor for timely patch releases and apply updates promptly once available. Consider implementing multi-factor authentication and session management improvements to reduce session hijacking risks associated with redirection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Carrier
Date Reserved
2024-09-06T16:01:32.884Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691dc7eb0d9a5150f8cfb1c5

Added to database: 11/19/2025, 1:36:43 PM

Last enriched: 11/26/2025, 2:07:53 PM

Last updated: 1/7/2026, 4:51:12 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats