Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0936: CWE-532: Insertion of Sensitive Information into Log in B&R Industrial Automation GmbH Process Visualization Interface (PVI)

0
Medium
VulnerabilityCVE-2026-0936cvecve-2026-0936cwe-532
Published: Thu Jan 29 2026 (01/29/2026, 15:30:48 UTC)
Source: CVE Database V5
Vendor/Project: B&R Industrial Automation GmbH
Product: Process Visualization Interface (PVI)

Description

CVE-2026-0936 is a medium-severity vulnerability in B&R Industrial Automation GmbH's Process Visualization Interface (PVI) client versions prior to 6. 5. It involves the insertion of sensitive information, such as credentials, into log files when logging is explicitly enabled by the user. An authenticated local attacker with limited privileges can exploit this vulnerability to access sensitive credential data processed by the PVI client. The logging feature is disabled by default, reducing the attack surface. No known exploits are currently in the wild. This vulnerability primarily impacts local users with access to the affected system and requires user interaction to enable logging. Organizations using affected PVI versions should carefully evaluate logging configurations and restrict local access to mitigate risk.

AI-Powered Analysis

AILast updated: 01/29/2026, 16:13:01 UTC

Technical Analysis

CVE-2026-0936 is a vulnerability classified under CWE-532, which pertains to the insertion of sensitive information into log files. The affected product is the Process Visualization Interface (PVI) client from B&R Industrial Automation GmbH, specifically versions prior to 6.5, including versions 4 and 6. The vulnerability arises because the PVI client, when logging is enabled, records sensitive credential information in its log files. This logging function is disabled by default, meaning that exploitation requires an explicit action by the user or administrator to enable logging. An attacker must have authenticated local access with limited privileges to the system running the PVI client to exploit this vulnerability. The attacker can then access the logs to retrieve sensitive credential data, potentially leading to further compromise. The CVSS v4.0 score is 5.1 (medium severity), reflecting the limited attack vector (local), low attack complexity, no requirement for authentication beyond local access, and the necessity of user interaction to enable logging. The vulnerability does not affect confidentiality, integrity, or availability directly beyond the exposure of credentials in logs. There are no known exploits in the wild, and no patches have been linked yet, so mitigation relies on configuration management and access controls.

Potential Impact

For European organizations using B&R Industrial Automation GmbH's PVI client versions prior to 6.5, this vulnerability poses a risk of credential exposure through log files if logging is enabled. Since the PVI client is used in industrial automation environments, exposure of credentials could lead to unauthorized access to industrial control systems or process visualization data. This could disrupt operational technology (OT) environments, potentially causing production downtime or safety risks. The impact is primarily on confidentiality, as sensitive credentials could be extracted by an authenticated local attacker. However, the requirement for local access and explicit enabling of logging limits the scope and ease of exploitation. European organizations with strict OT security policies and controlled local access may face lower risk, but those with less stringent controls or shared user environments could be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should ensure that logging in the PVI client is disabled unless absolutely necessary. If logging must be enabled for troubleshooting or auditing, access to log files should be strictly controlled using file system permissions and monitored for unauthorized access. Local user accounts should be limited to trusted personnel, and the principle of least privilege should be enforced to reduce the risk of an authenticated local attacker. Regular audits of logging configurations and log file contents should be conducted to detect any inadvertent exposure of sensitive information. Additionally, organizations should monitor for updates or patches from B&R Industrial Automation GmbH and apply them promptly once available. Network segmentation and endpoint protection on systems running the PVI client can further reduce the risk of local exploitation. Finally, educating local users about the risks of enabling logging and proper credential handling is recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2026-01-14T10:12:54.468Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697b837eac063202229a57f4

Added to database: 1/29/2026, 3:57:50 PM

Last enriched: 1/29/2026, 4:13:01 PM

Last updated: 1/29/2026, 6:21:26 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats