Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25751: CWE-306: Missing Authentication for Critical Function in frangoteam FUXA

0
Critical
VulnerabilityCVE-2026-25751cvecve-2026-25751cwe-306cwe-312
Published: Fri Feb 06 2026 (02/06/2026, 19:07:17 UTC)
Source: CVE Database V5
Vendor/Project: frangoteam
Product: FUXA

Description

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an unauthenticated, remote attacker to obtain the full system configuration, including administrative credentials for the InfluxDB database. Possession of these credentials may allow an attacker to authenticate directly to the database service, enabling them to read, modify, or delete all historical process data, or perform a Denial of Service by corrupting the database. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:12:06 UTC

Technical Analysis

CVE-2026-25751 identifies a critical security flaw in frangoteam's FUXA software, a web-based platform used for process visualization in SCADA, HMI, and dashboard applications. The vulnerability arises from missing authentication on a critical function that exposes administrative database credentials without requiring any user authentication or interaction. Specifically, an unauthenticated remote attacker can retrieve the full system configuration, including sensitive InfluxDB administrative credentials. This allows the attacker to directly authenticate to the InfluxDB service, enabling unauthorized reading, modification, or deletion of all historical process data. Additionally, the attacker can corrupt the database, causing denial of service conditions that disrupt industrial monitoring and control operations. The root cause is a lack of proper access controls (CWE-306) combined with information disclosure (CWE-312). The vulnerability affects all FUXA versions prior to 1.2.10, which has addressed the issue. The CVSS 4.0 base score of 9.1 reflects network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. While no active exploitation has been reported, the potential for severe operational disruption and data compromise in industrial environments is significant.

Potential Impact

For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize FUXA for process visualization and control, this vulnerability poses a significant risk. Unauthorized access to InfluxDB administrative credentials can lead to full compromise of historical process data integrity and availability, undermining operational reliability and safety. Attackers could manipulate process data to cause incorrect system behavior or disrupt monitoring, potentially leading to physical damage or safety incidents. The ability to delete or corrupt data also impacts forensic investigations and compliance with regulatory requirements such as NIS2 and GDPR. Given the criticality of industrial control systems in Europe’s economy and infrastructure, exploitation could result in substantial financial losses, reputational damage, and regulatory penalties. The vulnerability’s ease of exploitation without authentication increases the threat level, especially in environments where FUXA instances are exposed or insufficiently segmented from external networks.

Mitigation Recommendations

European organizations should immediately upgrade all FUXA installations to version 1.2.10 or later, where this vulnerability is patched. Until upgrades are completed, organizations should restrict network access to FUXA interfaces by implementing strict firewall rules and network segmentation to isolate SCADA/HMI systems from untrusted networks, including the internet. Employing VPNs or zero-trust network access solutions for remote connectivity can further reduce exposure. Monitoring and logging access to FUXA and InfluxDB services should be enhanced to detect anomalous activities indicative of credential theft or unauthorized database access. Additionally, organizations should rotate InfluxDB administrative credentials after patching to invalidate any potentially compromised secrets. Conducting regular vulnerability assessments and penetration tests focused on industrial control systems can help identify residual risks. Finally, integrating FUXA and InfluxDB into broader industrial cybersecurity frameworks and incident response plans will improve preparedness against exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.356Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863dc0f9fa50a62f29294f

Added to database: 2/6/2026, 7:15:12 PM

Last enriched: 2/14/2026, 12:12:06 PM

Last updated: 3/23/2026, 11:50:46 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses