CVE-2026-25751: CWE-306: Missing Authentication for Critical Function in frangoteam FUXA
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an unauthenticated, remote attacker to obtain the full system configuration, including administrative credentials for the InfluxDB database. Possession of these credentials may allow an attacker to authenticate directly to the database service, enabling them to read, modify, or delete all historical process data, or perform a Denial of Service by corrupting the database. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.
AI Analysis
Technical Summary
CVE-2026-25751 identifies a critical security flaw in frangoteam's FUXA software, a web-based platform used for process visualization in SCADA, HMI, and dashboard applications. The vulnerability arises from missing authentication on a critical function that exposes administrative database credentials without requiring any user authentication or interaction. Specifically, an unauthenticated remote attacker can retrieve the full system configuration, including sensitive InfluxDB administrative credentials. This allows the attacker to directly authenticate to the InfluxDB service, enabling unauthorized reading, modification, or deletion of all historical process data. Additionally, the attacker can corrupt the database, causing denial of service conditions that disrupt industrial monitoring and control operations. The root cause is a lack of proper access controls (CWE-306) combined with information disclosure (CWE-312). The vulnerability affects all FUXA versions prior to 1.2.10, which has addressed the issue. The CVSS 4.0 base score of 9.1 reflects network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. While no active exploitation has been reported, the potential for severe operational disruption and data compromise in industrial environments is significant.
Potential Impact
For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize FUXA for process visualization and control, this vulnerability poses a significant risk. Unauthorized access to InfluxDB administrative credentials can lead to full compromise of historical process data integrity and availability, undermining operational reliability and safety. Attackers could manipulate process data to cause incorrect system behavior or disrupt monitoring, potentially leading to physical damage or safety incidents. The ability to delete or corrupt data also impacts forensic investigations and compliance with regulatory requirements such as NIS2 and GDPR. Given the criticality of industrial control systems in Europe’s economy and infrastructure, exploitation could result in substantial financial losses, reputational damage, and regulatory penalties. The vulnerability’s ease of exploitation without authentication increases the threat level, especially in environments where FUXA instances are exposed or insufficiently segmented from external networks.
Mitigation Recommendations
European organizations should immediately upgrade all FUXA installations to version 1.2.10 or later, where this vulnerability is patched. Until upgrades are completed, organizations should restrict network access to FUXA interfaces by implementing strict firewall rules and network segmentation to isolate SCADA/HMI systems from untrusted networks, including the internet. Employing VPNs or zero-trust network access solutions for remote connectivity can further reduce exposure. Monitoring and logging access to FUXA and InfluxDB services should be enhanced to detect anomalous activities indicative of credential theft or unauthorized database access. Additionally, organizations should rotate InfluxDB administrative credentials after patching to invalidate any potentially compromised secrets. Conducting regular vulnerability assessments and penetration tests focused on industrial control systems can help identify residual risks. Finally, integrating FUXA and InfluxDB into broader industrial cybersecurity frameworks and incident response plans will improve preparedness against exploitation attempts.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2026-25751: CWE-306: Missing Authentication for Critical Function in frangoteam FUXA
Description
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an unauthenticated, remote attacker to obtain the full system configuration, including administrative credentials for the InfluxDB database. Possession of these credentials may allow an attacker to authenticate directly to the database service, enabling them to read, modify, or delete all historical process data, or perform a Denial of Service by corrupting the database. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25751 identifies a critical security flaw in frangoteam's FUXA software, a web-based platform used for process visualization in SCADA, HMI, and dashboard applications. The vulnerability arises from missing authentication on a critical function that exposes administrative database credentials without requiring any user authentication or interaction. Specifically, an unauthenticated remote attacker can retrieve the full system configuration, including sensitive InfluxDB administrative credentials. This allows the attacker to directly authenticate to the InfluxDB service, enabling unauthorized reading, modification, or deletion of all historical process data. Additionally, the attacker can corrupt the database, causing denial of service conditions that disrupt industrial monitoring and control operations. The root cause is a lack of proper access controls (CWE-306) combined with information disclosure (CWE-312). The vulnerability affects all FUXA versions prior to 1.2.10, which has addressed the issue. The CVSS 4.0 base score of 9.1 reflects network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality and integrity. While no active exploitation has been reported, the potential for severe operational disruption and data compromise in industrial environments is significant.
Potential Impact
For European organizations, particularly those in manufacturing, energy, utilities, and critical infrastructure sectors that utilize FUXA for process visualization and control, this vulnerability poses a significant risk. Unauthorized access to InfluxDB administrative credentials can lead to full compromise of historical process data integrity and availability, undermining operational reliability and safety. Attackers could manipulate process data to cause incorrect system behavior or disrupt monitoring, potentially leading to physical damage or safety incidents. The ability to delete or corrupt data also impacts forensic investigations and compliance with regulatory requirements such as NIS2 and GDPR. Given the criticality of industrial control systems in Europe’s economy and infrastructure, exploitation could result in substantial financial losses, reputational damage, and regulatory penalties. The vulnerability’s ease of exploitation without authentication increases the threat level, especially in environments where FUXA instances are exposed or insufficiently segmented from external networks.
Mitigation Recommendations
European organizations should immediately upgrade all FUXA installations to version 1.2.10 or later, where this vulnerability is patched. Until upgrades are completed, organizations should restrict network access to FUXA interfaces by implementing strict firewall rules and network segmentation to isolate SCADA/HMI systems from untrusted networks, including the internet. Employing VPNs or zero-trust network access solutions for remote connectivity can further reduce exposure. Monitoring and logging access to FUXA and InfluxDB services should be enhanced to detect anomalous activities indicative of credential theft or unauthorized database access. Additionally, organizations should rotate InfluxDB administrative credentials after patching to invalidate any potentially compromised secrets. Conducting regular vulnerability assessments and penetration tests focused on industrial control systems can help identify residual risks. Finally, integrating FUXA and InfluxDB into broader industrial cybersecurity frameworks and incident response plans will improve preparedness against exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.356Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69863dc0f9fa50a62f29294f
Added to database: 2/6/2026, 7:15:12 PM
Last enriched: 2/14/2026, 12:12:06 PM
Last updated: 3/23/2026, 11:50:46 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.