Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0657: CWE-129 Improper Validation of Array Index in Automated Logic WebCtrl

0
High
VulnerabilityCVE-2025-0657cvecve-2025-0657cwe-129cwe-248
Published: Thu Nov 27 2025 (11/27/2025, 01:00:59 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCtrl

Description

A weakness in Automated Logic and Carrier i-Vu Gen5 router on driver version drv_gen5_106-01-2380, allows malformed packets to be sent through BACnet MS/TP network causing the devices to enter a fault state. This fault state requires a manual power cycle to return the device to network visibility.

AI-Powered Analysis

AILast updated: 11/27/2025, 01:25:10 UTC

Technical Analysis

CVE-2025-0657 is a vulnerability identified in Automated Logic's WebCtrl and Carrier's i-Vu Gen5 routers, specifically in driver version drv_gen5_106-01-2380. The root cause is improper validation of array indices (CWE-129) when processing BACnet MS/TP protocol packets. BACnet MS/TP is a widely used protocol in building automation systems for communication between devices such as HVAC controllers, lighting, and security systems. The vulnerability allows an attacker to send specially crafted malformed packets over the BACnet MS/TP network, which triggers an out-of-bounds array access or similar memory corruption condition. This causes the device to enter a fault state, effectively disconnecting it from the network and disabling its functionality. Recovery requires a manual power cycle, indicating that the fault state is persistent and cannot be resolved remotely. The CVSS 4.0 score of 8.8 reflects the high impact on availability (VC:H), low impact on confidentiality and integrity, no required privileges or user interaction, and the ability to exploit remotely over the network. No patches or fixes have been published yet, and no known exploits are reported in the wild, but the vulnerability poses a significant risk to operational continuity in environments relying on these devices. The vulnerability also relates to CWE-248 (Uncaught Exception), suggesting that the device software does not properly handle unexpected conditions triggered by malformed input. Given the critical role of these devices in building management, exploitation could disrupt HVAC, lighting, and other essential services.

Potential Impact

For European organizations, the primary impact is on the availability and reliability of building automation systems that use Automated Logic WebCtrl or Carrier i-Vu Gen5 routers. Disruption of these systems can lead to loss of environmental controls such as heating, ventilation, air conditioning, and lighting, which can affect occupant comfort, safety, and energy efficiency. In critical infrastructure facilities, hospitals, data centers, and large commercial buildings, such outages could have cascading effects on operations and safety compliance. The requirement for manual power cycling means that remote recovery is not possible, increasing downtime and operational costs. Additionally, attackers could leverage this vulnerability as part of a broader attack to cause physical disruption or to create entry points for further network intrusion. The lack of authentication or user interaction for exploitation increases the risk, especially in environments where BACnet MS/TP networks are accessible or insufficiently segmented. European organizations with extensive building automation deployments are therefore at risk of operational interruptions and potential safety hazards.

Mitigation Recommendations

1. Immediately segment BACnet MS/TP networks from general IT networks and restrict access to trusted devices only. 2. Implement network monitoring and anomaly detection specifically for BACnet traffic to identify malformed or suspicious packets early. 3. Establish manual recovery procedures and ensure facility staff are trained to perform power cycles safely and promptly if devices enter a fault state. 4. Coordinate with Automated Logic and Carrier for timely release and deployment of patches or firmware updates once available. 5. Consider deploying network-level protections such as BACnet-aware firewalls or protocol gateways that can validate packet integrity before forwarding. 6. Conduct regular audits of building automation network architecture to minimize exposure and ensure compliance with security best practices. 7. Maintain an inventory of affected devices and prioritize their protection in critical facilities. 8. Engage with vendors for potential workarounds or configuration changes that may mitigate the vulnerability until patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Carrier
Date Reserved
2025-01-22T20:22:14.084Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6927a51dd322a87b22026c0f

Added to database: 11/27/2025, 1:10:53 AM

Last enriched: 11/27/2025, 1:25:10 AM

Last updated: 11/27/2025, 3:35:25 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats