Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25086: CWE-605 in Automated Logic WebCTRL Premium Server

0
High
VulnerabilityCVE-2026-25086cvecve-2026-25086cwe-605
Published: Fri Mar 20 2026 (03/20/2026, 23:14:23 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL Premium Server

Description

Under certain conditions, an attacker could bind to the same port used by WebCTRL. This could allow the attacker to craft and send malicious packets and impersonate the WebCTRL service without requiring code injection into the WebCTRL software.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 21:43:36 UTC

Technical Analysis

CVE-2026-25086 is a vulnerability identified in Automated Logic's WebCTRL Premium Server, a widely used building automation and control system platform. The issue arises from the server's failure to properly control access to its network port, allowing an attacker to bind to the same port as the legitimate WebCTRL service. This vulnerability is categorized under CWE-605, which involves improper control of a resource through its lifetime, specifically the network port resource. By binding to the port, an attacker can impersonate the WebCTRL service and send crafted malicious packets to clients or other networked components expecting legitimate communication. Notably, this attack vector does not require code injection into the WebCTRL software, lowering the complexity of exploitation. The CVSS 3.1 base score is 7.7, indicating high severity, with the vector string AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N. This means the attack requires local access (e.g., on the same network segment or host), has low attack complexity, requires no privileges or user interaction, and impacts confidentiality and integrity significantly, but not availability. The vulnerability could allow attackers to intercept or manipulate sensitive control commands or data, potentially leading to unauthorized control or data leakage within building management systems. Although no exploits have been reported in the wild yet, the nature of the vulnerability suggests a strong potential for misuse in targeted attacks against critical infrastructure environments that rely on WebCTRL. The absence of a patch at the time of publication necessitates immediate risk mitigation through network controls and monitoring.

Potential Impact

The impact of CVE-2026-25086 is substantial for organizations using Automated Logic's WebCTRL Premium Server, particularly those managing critical infrastructure such as commercial buildings, data centers, hospitals, and industrial facilities. Successful exploitation allows an attacker to impersonate the WebCTRL service, potentially intercepting or injecting malicious commands that could alter building automation functions like HVAC, lighting, or security systems. This can lead to unauthorized disclosure of sensitive operational data (confidentiality impact) and unauthorized modification of system behavior (integrity impact). Although availability is not directly affected, the manipulation of control systems can indirectly disrupt operations or safety. The requirement for local access limits remote exploitation but does not eliminate risk, especially in environments with insufficient network segmentation or insider threats. The vulnerability could be leveraged in multi-stage attacks to gain deeper access or cause physical consequences. Organizations worldwide relying on WebCTRL for building management face risks of espionage, operational disruption, or safety hazards if this vulnerability is exploited.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Enforce strict network segmentation to isolate WebCTRL servers from general user networks and untrusted devices, limiting local access to authorized personnel only. 2) Deploy network monitoring and intrusion detection systems to identify anomalous port binding attempts or unexpected traffic patterns on the WebCTRL service ports. 3) Use host-based firewalls on WebCTRL servers to restrict which processes or users can bind to critical service ports. 4) Conduct regular audits of network and system configurations to ensure no unauthorized services are running on WebCTRL ports. 5) Implement strong physical security controls to prevent unauthorized local access to servers. 6) Prepare for rapid deployment of patches by establishing a vulnerability management process specific to building management systems. 7) Educate operational technology (OT) staff about this vulnerability and the importance of monitoring for suspicious activity. These targeted measures go beyond generic advice by focusing on the unique local access vector and port binding nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T19:57:03.300Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdd7ec1188d0bb0cbf88c3

Added to database: 3/20/2026, 11:27:40 PM

Last enriched: 3/28/2026, 9:43:36 PM

Last updated: 4/30/2026, 9:06:00 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses