Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21410: CWE-89 in InSAT MasterSCADA BUK-TS

0
Critical
VulnerabilityCVE-2026-21410cvecve-2026-21410cwe-89
Published: Tue Feb 24 2026 (02/24/2026, 20:53:55 UTC)
Source: CVE Database V5
Vendor/Project: InSAT
Product: MasterSCADA BUK-TS

Description

InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 19:09:10 UTC

Technical Analysis

CVE-2026-21410 is a critical security vulnerability classified under CWE-89 (SQL Injection) affecting all versions of InSAT MasterSCADA BUK-TS, a supervisory control and data acquisition (SCADA) system used in industrial environments. The vulnerability resides in the main web interface of the product, where insufficient input validation allows attackers to inject malicious SQL queries. This injection flaw enables attackers to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or deletion. More critically, the vulnerability can be leveraged to achieve remote code execution (RCE) on the underlying server, granting attackers full control over the affected system. The CVSS v3.1 score of 9.8 reflects the vulnerability's ease of exploitation (network vector, no privileges or user interaction required) and its severe impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on February 24, 2026, with no patches currently available, and no known exploits detected in the wild. Given the nature of SCADA systems, exploitation could disrupt industrial processes, cause operational downtime, and potentially lead to physical damage or safety hazards. The vulnerability's presence in all versions of the product underscores the urgency for affected organizations to implement compensating controls or seek vendor updates once available.

Potential Impact

The impact of CVE-2026-21410 on organizations worldwide is substantial, especially for those operating critical infrastructure such as energy, water treatment, manufacturing, and transportation sectors that rely on InSAT MasterSCADA BUK-TS. Exploitation can lead to full system compromise, allowing attackers to manipulate industrial processes, steal sensitive operational data, or cause service outages. The ability to execute arbitrary code remotely without authentication increases the risk of widespread disruption and potential sabotage. This could result in significant financial losses, safety incidents, regulatory penalties, and damage to organizational reputation. The vulnerability also raises concerns about national security in countries where industrial control systems are integral to essential services. The lack of available patches further exacerbates the risk, forcing organizations to rely on network segmentation and monitoring to mitigate exposure.

Mitigation Recommendations

Given the absence of official patches, organizations should immediately implement the following specific mitigations: 1) Restrict network access to the MasterSCADA BUK-TS web interface by isolating it within secure network segments and enforcing strict firewall rules to limit exposure to trusted IP addresses only. 2) Deploy web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable endpoints. 3) Conduct thorough input validation and sanitization on any user-supplied data if custom integrations or extensions exist. 4) Monitor logs and network traffic for unusual database queries or signs of exploitation attempts. 5) Implement multi-factor authentication and strong access controls around SCADA management interfaces to reduce attack surface. 6) Prepare incident response plans specifically addressing potential SCADA compromises. 7) Engage with the vendor for timely updates and patches, and plan for rapid deployment once available. 8) Consider temporary shutdown or replacement of vulnerable systems in high-risk environments if mitigation controls are insufficient.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-09T17:52:06.910Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699e140db7ef31ef0b39733a

Added to database: 2/24/2026, 9:11:41 PM

Last enriched: 3/4/2026, 7:09:10 PM

Last updated: 4/10/2026, 10:39:01 PM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses