Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24060: CWE-319 in Automated Logic WebCTRL Premium Server

0
Critical
VulnerabilityCVE-2026-24060cvecve-2026-24060cwe-319
Published: Fri Mar 20 2026 (03/20/2026, 23:19:05 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL Premium Server

Description

Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and reverse engineered.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:38:14 UTC

Technical Analysis

CVE-2026-24060 is a vulnerability classified under CWE-319 (Cleartext Transmission of Sensitive Information) affecting Automated Logic's WebCTRL Premium Server. The issue arises because service information transmitted over the network as BACnet packets is not encrypted, allowing attackers with network access to passively capture and analyze this data. Specifically, sensitive information such as File Start Position and File Data can be extracted using Wireshark's BACnet dissector filter. Additionally, the proprietary format used by WebCTRL to receive updates from programmable logic controllers (PLCs) can be sniffed and reverse engineered, potentially exposing update mechanisms and internal protocols. The vulnerability has a CVSS 3.1 base score of 9.1, reflecting its critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality and integrity (C:H/I:H/A:N). This means an attacker can exploit the vulnerability remotely without authentication or user interaction, leading to significant data exposure and potential manipulation. Although no public exploits have been reported yet, the vulnerability poses a serious risk to industrial control systems and building management systems relying on WebCTRL Premium Server. The lack of encryption in BACnet communications is a fundamental security weakness that can be exploited in environments where network segmentation or monitoring is insufficient. The vulnerability was published on March 20, 2026, and no patches or mitigations have been officially released by the vendor at the time of this report.

Potential Impact

The impact of CVE-2026-24060 is substantial for organizations using Automated Logic WebCTRL Premium Server in their industrial control or building automation environments. Confidentiality is severely compromised as attackers can intercept sensitive configuration and update data transmitted in cleartext. Integrity is also at risk because intercepted packets can be modified, potentially allowing attackers to alter commands or updates sent to PLCs, leading to unauthorized control or disruption of critical systems. Although availability impact is not directly indicated, manipulation of control data could indirectly cause system malfunctions or downtime. The vulnerability enables remote attackers to exploit the system without authentication or user interaction, increasing the attack surface significantly. Organizations operating critical infrastructure such as energy, manufacturing, water treatment, and large commercial buildings could face operational disruptions, safety hazards, and regulatory compliance issues if this vulnerability is exploited. The ability to reverse engineer proprietary update formats further increases the risk of sophisticated attacks targeting the update mechanism or injecting malicious payloads. Overall, the vulnerability threatens the confidentiality and integrity of industrial control communications, which are vital for safe and reliable operations.

Mitigation Recommendations

To mitigate CVE-2026-24060, organizations should implement the following specific measures: 1) Immediately segment and isolate networks running WebCTRL Premium Server and BACnet traffic to limit exposure to untrusted networks or users. 2) Deploy VPNs or secure tunneling protocols (e.g., IPsec, TLS) to encrypt BACnet communications over the network, compensating for the lack of native encryption. 3) Use network monitoring tools with BACnet protocol awareness to detect unusual traffic patterns or unauthorized sniffing attempts. 4) Restrict physical and logical access to network infrastructure and devices involved in BACnet communications to trusted personnel only. 5) Engage with Automated Logic for any available patches or firmware updates addressing this vulnerability and apply them promptly once released. 6) Consider implementing additional application-layer encryption or authentication mechanisms if supported by the control system architecture. 7) Conduct regular security assessments and penetration tests focusing on industrial control system networks to identify and remediate similar weaknesses. 8) Train operational technology (OT) staff on the risks of unencrypted protocols and best practices for securing control system communications. These measures go beyond generic advice by focusing on compensating controls for the protocol’s inherent lack of encryption and emphasizing network architecture hardening.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T19:57:03.348Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdda56b462d409683a8bc9

Added to database: 3/20/2026, 11:37:58 PM

Last enriched: 3/20/2026, 11:38:14 PM

Last updated: 3/21/2026, 3:28:15 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses