Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1692: CWE-1385 Missing Origin Validation in WebSockets in arcinfo PcVue

0
Medium
VulnerabilityCVE-2026-1692cvecve-2026-1692cwe-1385
Published: Thu Feb 26 2026 (02/26/2026, 07:55:18 UTC)
Source: CVE Database V5
Vendor/Project: arcinfo
Product: PcVue

Description

A missing origin validation in WebSockets vulnerability affects the GraphicalData web services used by the WebVue, WebScheduler, TouchVue and SnapVue features of PcVue in version 12.0.0 through 16.3.3 included. It might allow a remote attacker to lure a successfully authenticated user to a malicious website. This vulnerability only affects the following two endpoints: GraphicalData/js/signalR/connect and GraphicalData/js/signalR/reconnect.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:43:10 UTC

Technical Analysis

CVE-2026-1692 identifies a missing origin validation vulnerability in the WebSocket implementation of arcinfo's PcVue software, versions 12.0.0 through 16.3.3. The affected components are the GraphicalData web services utilized by the WebVue, WebScheduler, TouchVue, and SnapVue features. Specifically, the vulnerability exists in two WebSocket endpoints: GraphicalData/js/signalR/connect and GraphicalData/js/signalR/reconnect. Origin validation is a critical security control that ensures WebSocket connections originate from trusted sources; its absence allows attackers to bypass same-origin policies. In this case, a remote attacker can lure an authenticated user to a malicious website that initiates a WebSocket connection to the vulnerable PcVue service, potentially hijacking the session or performing unauthorized actions through the user's authenticated context. The vulnerability does not require authentication or privileges on the attacker’s part but does require user interaction (visiting a malicious site). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, user interaction required, and low confidentiality and integrity impact. No public exploits are currently known, but the affected PcVue versions are widely used in industrial control and building automation environments, increasing the risk of targeted attacks. The vulnerability is classified under CWE-1385, highlighting missing origin validation in WebSockets as the root cause.

Potential Impact

The vulnerability could allow attackers to perform cross-origin WebSocket attacks against PcVue users, potentially leading to unauthorized command execution or data manipulation within the affected industrial or building management systems. This could disrupt operational processes, cause data integrity issues, or enable further lateral movement within critical infrastructure networks. Since PcVue is used globally in industrial automation, exploitation could impact manufacturing plants, utilities, and smart building environments, leading to operational downtime or safety risks. The requirement for user interaction limits mass exploitation but targeted spear-phishing or watering hole attacks could be effective. The medium CVSS score reflects moderate confidentiality and integrity impact with no direct availability impact. However, in critical infrastructure contexts, even moderate integrity compromises can have severe real-world consequences. Organizations relying on PcVue should consider this vulnerability a significant risk to operational technology security.

Mitigation Recommendations

Organizations should immediately assess their PcVue deployments to identify affected versions (12.0.0 through 16.3.3). Since no patches are currently listed, mitigating controls include restricting access to the GraphicalData/js/signalR/connect and reconnect endpoints via network segmentation and firewall rules to limit exposure to trusted networks only. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious WebSocket connection attempts from untrusted origins. Educate users about the risks of visiting untrusted websites to reduce the likelihood of social engineering attacks. Monitor network traffic for anomalous WebSocket connections and implement logging to detect potential exploitation attempts. Coordinate with arcinfo for timely patch releases and apply updates as soon as they become available. Additionally, consider deploying multi-factor authentication and session management enhancements to reduce the impact of session hijacking attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
arcinfo
Date Reserved
2026-01-30T08:37:33.143Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a00034b7ef31ef0bd4068c

Added to database: 2/26/2026, 8:11:32 AM

Last enriched: 3/26/2026, 6:43:10 PM

Last updated: 4/13/2026, 1:36:51 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses