Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22542: CWE-400 Uncontrolled Resource Consumption in EFACEC QC 60/90/120

0
Critical
VulnerabilityCVE-2026-22542cvecve-2026-22542cwe-400
Published: Wed Jan 07 2026 (01/07/2026, 15:24:04 UTC)
Source: CVE Database V5
Vendor/Project: EFACEC
Product: QC 60/90/120

Description

An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.

AI-Powered Analysis

AILast updated: 01/07/2026, 15:56:48 UTC

Technical Analysis

CVE-2026-22542 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting EFACEC QC 60/90/120 devices, specifically version 8. The flaw allows an attacker with access to the system's internal network to cause a denial of service (DoS) by establishing two concurrent connections via the Telnet service. The vulnerability arises because the device does not properly limit or manage resource allocation for Telnet connections, enabling resource exhaustion with minimal effort. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H) indicates that the attack can be performed remotely over the network without authentication or user interaction, with a high impact on availability. The lack of authentication and the low complexity of the attack make this vulnerability particularly dangerous in environments where the internal network is accessible to potential attackers. EFACEC QC series devices are commonly used in industrial control systems, energy management, and critical infrastructure sectors, where availability is paramount. Although no public exploits have been reported yet, the critical severity score and the nature of the vulnerability suggest that exploitation could lead to significant operational disruptions. The absence of patch links indicates that a fix may not yet be available, emphasizing the importance of interim mitigations.

Potential Impact

The primary impact of CVE-2026-22542 is denial of service, which can disrupt the availability of EFACEC QC 60/90/120 devices. For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and transportation, this could lead to operational downtime, safety risks, and financial losses. Disruption of these devices could affect industrial control systems and energy distribution networks, potentially causing cascading failures or service interruptions. The vulnerability's ease of exploitation without authentication means that insider threats or lateral movement by attackers who have breached internal networks could quickly leverage this flaw. The lack of user interaction and the minimal resource requirement to trigger the DoS increase the likelihood of successful attacks. This could undermine trust in industrial automation and control environments, leading to regulatory and compliance challenges under European cybersecurity frameworks such as NIS2.

Mitigation Recommendations

1. Immediately restrict access to the internal network segments hosting EFACEC QC 60/90/120 devices, ensuring only trusted and authorized systems can communicate with them. 2. Disable the Telnet service on affected devices if possible, or replace it with more secure protocols like SSH. 3. Implement network-level controls such as firewalls and intrusion detection/prevention systems to monitor and block multiple concurrent Telnet connections from the same source. 4. Conduct regular network traffic analysis to detect unusual connection patterns indicative of exploitation attempts. 5. Engage with EFACEC support or vendors to obtain patches or firmware updates as soon as they become available. 6. Develop and test incident response plans specifically addressing denial of service scenarios affecting industrial control devices. 7. Segment industrial control networks from corporate IT networks to limit attacker movement and exposure. 8. Educate internal teams about the risks of this vulnerability and the importance of internal network security hygiene.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
S21sec
Date Reserved
2026-01-07T14:01:04.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695e7ee47349d0379daa4383

Added to database: 1/7/2026, 3:42:28 PM

Last enriched: 1/7/2026, 3:56:48 PM

Last updated: 1/9/2026, 2:10:59 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats