CVE-2026-24060: CWE-319 in Automated Logic WebCTRL Premium Server
Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and reverse engineered.
AI Analysis
Technical Summary
CVE-2026-24060 is a vulnerability categorized under CWE-319 (Cleartext Transmission of Sensitive Information) affecting Automated Logic's WebCTRL Premium Server. The issue arises because BACnet packets, which carry service information including File Start Position and File Data, are transmitted over the network without encryption. Attackers with network access can use packet sniffing tools such as Wireshark with BACnet dissector filters to capture and analyze this traffic. This exposure allows attackers to glean sensitive operational details and potentially modify the intercepted data, compromising the integrity of communications between the WebCTRL server and PLCs. Additionally, the proprietary format used by WebCTRL for receiving updates from PLCs can be reverse engineered from the intercepted data, potentially enabling further attacks or unauthorized manipulation. The vulnerability requires no authentication or user interaction, making it exploitable by any attacker with network access to the BACnet traffic. The CVSS v3.1 base score is 9.1, reflecting the high impact on confidentiality and integrity with network attack vector and low attack complexity. No patches are currently listed, and no known exploits have been reported in the wild as of the publication date. This vulnerability primarily affects organizations using Automated Logic's WebCTRL Premium Server in their building automation and control systems, especially those relying on BACnet protocol communications.
Potential Impact
The primary impact of CVE-2026-24060 is the exposure of sensitive operational data transmitted in cleartext over the network, which compromises confidentiality. Attackers can intercept and analyze BACnet packets to extract critical information such as file positions and data used in PLC updates. This can lead to unauthorized disclosure of system internals and potentially facilitate further attacks such as data manipulation or injection of malicious commands, thereby impacting data integrity. Although availability is not directly affected, the integrity compromise could lead to operational disruptions if attackers modify control data. The vulnerability is particularly severe because it requires no authentication or user interaction, making exploitation straightforward for anyone with network access. Organizations relying on WebCTRL for building automation, HVAC, or industrial control systems could face operational risks, regulatory compliance issues, and potential safety hazards if attackers leverage this vulnerability. The lack of encryption also increases the risk in environments where network segmentation or monitoring is insufficient.
Mitigation Recommendations
To mitigate CVE-2026-24060, organizations should implement network-level protections to prevent unauthorized access to BACnet traffic. This includes strict network segmentation to isolate building automation systems from general IT networks and the internet. Deploying Virtual Private Networks (VPNs) or secure tunnels such as IPsec for BACnet communications can encrypt traffic and prevent sniffing. Monitoring network traffic for unusual BACnet packet patterns or unexpected modifications can help detect exploitation attempts. Where possible, upgrading to versions of WebCTRL that implement encryption or secure communication protocols should be prioritized once available. Additionally, applying strict access controls and limiting physical and logical access to network segments carrying BACnet traffic reduces exposure. Organizations should also engage with Automated Logic for patches or security advisories and consider compensating controls such as intrusion detection systems tailored for industrial protocols. Regular security assessments and penetration testing focusing on building automation networks can identify weaknesses related to this vulnerability.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, United Arab Emirates, Singapore
CVE-2026-24060: CWE-319 in Automated Logic WebCTRL Premium Server
Description
Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and reverse engineered.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-24060 is a vulnerability categorized under CWE-319 (Cleartext Transmission of Sensitive Information) affecting Automated Logic's WebCTRL Premium Server. The issue arises because BACnet packets, which carry service information including File Start Position and File Data, are transmitted over the network without encryption. Attackers with network access can use packet sniffing tools such as Wireshark with BACnet dissector filters to capture and analyze this traffic. This exposure allows attackers to glean sensitive operational details and potentially modify the intercepted data, compromising the integrity of communications between the WebCTRL server and PLCs. Additionally, the proprietary format used by WebCTRL for receiving updates from PLCs can be reverse engineered from the intercepted data, potentially enabling further attacks or unauthorized manipulation. The vulnerability requires no authentication or user interaction, making it exploitable by any attacker with network access to the BACnet traffic. The CVSS v3.1 base score is 9.1, reflecting the high impact on confidentiality and integrity with network attack vector and low attack complexity. No patches are currently listed, and no known exploits have been reported in the wild as of the publication date. This vulnerability primarily affects organizations using Automated Logic's WebCTRL Premium Server in their building automation and control systems, especially those relying on BACnet protocol communications.
Potential Impact
The primary impact of CVE-2026-24060 is the exposure of sensitive operational data transmitted in cleartext over the network, which compromises confidentiality. Attackers can intercept and analyze BACnet packets to extract critical information such as file positions and data used in PLC updates. This can lead to unauthorized disclosure of system internals and potentially facilitate further attacks such as data manipulation or injection of malicious commands, thereby impacting data integrity. Although availability is not directly affected, the integrity compromise could lead to operational disruptions if attackers modify control data. The vulnerability is particularly severe because it requires no authentication or user interaction, making exploitation straightforward for anyone with network access. Organizations relying on WebCTRL for building automation, HVAC, or industrial control systems could face operational risks, regulatory compliance issues, and potential safety hazards if attackers leverage this vulnerability. The lack of encryption also increases the risk in environments where network segmentation or monitoring is insufficient.
Mitigation Recommendations
To mitigate CVE-2026-24060, organizations should implement network-level protections to prevent unauthorized access to BACnet traffic. This includes strict network segmentation to isolate building automation systems from general IT networks and the internet. Deploying Virtual Private Networks (VPNs) or secure tunnels such as IPsec for BACnet communications can encrypt traffic and prevent sniffing. Monitoring network traffic for unusual BACnet packet patterns or unexpected modifications can help detect exploitation attempts. Where possible, upgrading to versions of WebCTRL that implement encryption or secure communication protocols should be prioritized once available. Additionally, applying strict access controls and limiting physical and logical access to network segments carrying BACnet traffic reduces exposure. Organizations should also engage with Automated Logic for patches or security advisories and consider compensating controls such as intrusion detection systems tailored for industrial protocols. Regular security assessments and penetration testing focusing on building automation networks can identify weaknesses related to this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-03-12T19:57:03.348Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bdda56b462d409683a8bc9
Added to database: 3/20/2026, 11:37:58 PM
Last enriched: 3/28/2026, 9:43:26 PM
Last updated: 5/3/2026, 3:49:50 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.