CVE-2026-25752: CWE-862: Missing Authorization in frangoteam FUXA
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote attacker to bypass role-based access controls and overwrite arbitrary device tags or disable communication drivers, exposing connected ICS/SCADA environments to follow-on actions. This may allow an attacker to manipulate physical processes and disconnected devices from the HMI. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.
AI Analysis
Technical Summary
CVE-2026-25752 identifies a critical missing authorization vulnerability (CWE-862) in frangoteam's FUXA software, a web-based process visualization tool used in SCADA, HMI, and dashboard environments. The flaw allows unauthenticated remote attackers to bypass role-based access controls by exploiting WebSocket communications, enabling them to modify device tags arbitrarily or disable communication drivers. This vulnerability affects all FUXA versions prior to 1.2.10. The exploitation vector requires no authentication or user interaction, making it highly accessible to attackers. By manipulating device tags or disabling drivers, attackers can interfere with the integrity and availability of connected industrial control systems, potentially causing physical process disruptions or damage. The vulnerability has a CVSS 4.0 score of 9.3, indicating critical severity due to its network attack vector, lack of required privileges, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the risk is significant given the critical nature of SCADA environments. The issue was publicly disclosed on February 6, 2026, and patched in FUXA version 1.2.10. Organizations relying on FUXA for industrial monitoring and control should prioritize patching and implement compensating controls to mitigate exploitation risks.
Potential Impact
The impact of CVE-2026-25752 on European organizations is substantial, especially those operating critical infrastructure such as energy, manufacturing, water treatment, and transportation sectors that utilize SCADA and HMI systems. Successful exploitation can lead to unauthorized modification of device tags or disabling of communication drivers, resulting in loss of control over physical processes. This can cause operational disruptions, safety hazards, equipment damage, and potential environmental harm. The integrity and availability of industrial control systems are directly threatened, increasing the risk of downtime and costly recovery efforts. Confidentiality is also impacted as attackers gain unauthorized access to system controls. Given the critical role of SCADA systems in European industrial environments, this vulnerability could facilitate sabotage, espionage, or ransomware attacks. The lack of authentication and user interaction requirements heightens the threat, making it easier for remote attackers to exploit the vulnerability without insider access or social engineering. Consequently, the vulnerability poses a significant risk to the stability and security of European critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-25752, European organizations should immediately upgrade FUXA installations to version 1.2.10 or later, where the authorization bypass flaw is patched. Beyond patching, organizations should implement strict network segmentation to isolate SCADA/HMI systems from general IT networks and the internet, reducing exposure to remote attacks. Deploy WebSocket traffic monitoring and anomaly detection to identify unauthorized or suspicious commands targeting device tags or communication drivers. Enforce strong access controls and multi-factor authentication for all management interfaces, even if the vulnerability bypasses some controls, to limit attack surface. Regularly audit and review device tag configurations and communication driver statuses for unexpected changes. Employ intrusion detection and prevention systems tailored for industrial protocols to detect exploitation attempts. Additionally, maintain up-to-date incident response plans specific to ICS environments to quickly contain and remediate any compromise. Training staff on the risks associated with SCADA vulnerabilities and secure configuration best practices is also essential.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Spain, Sweden, Finland
CVE-2026-25752: CWE-862: Missing Authorization in frangoteam FUXA
Description
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote attacker to bypass role-based access controls and overwrite arbitrary device tags or disable communication drivers, exposing connected ICS/SCADA environments to follow-on actions. This may allow an attacker to manipulate physical processes and disconnected devices from the HMI. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25752 identifies a critical missing authorization vulnerability (CWE-862) in frangoteam's FUXA software, a web-based process visualization tool used in SCADA, HMI, and dashboard environments. The flaw allows unauthenticated remote attackers to bypass role-based access controls by exploiting WebSocket communications, enabling them to modify device tags arbitrarily or disable communication drivers. This vulnerability affects all FUXA versions prior to 1.2.10. The exploitation vector requires no authentication or user interaction, making it highly accessible to attackers. By manipulating device tags or disabling drivers, attackers can interfere with the integrity and availability of connected industrial control systems, potentially causing physical process disruptions or damage. The vulnerability has a CVSS 4.0 score of 9.3, indicating critical severity due to its network attack vector, lack of required privileges, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the risk is significant given the critical nature of SCADA environments. The issue was publicly disclosed on February 6, 2026, and patched in FUXA version 1.2.10. Organizations relying on FUXA for industrial monitoring and control should prioritize patching and implement compensating controls to mitigate exploitation risks.
Potential Impact
The impact of CVE-2026-25752 on European organizations is substantial, especially those operating critical infrastructure such as energy, manufacturing, water treatment, and transportation sectors that utilize SCADA and HMI systems. Successful exploitation can lead to unauthorized modification of device tags or disabling of communication drivers, resulting in loss of control over physical processes. This can cause operational disruptions, safety hazards, equipment damage, and potential environmental harm. The integrity and availability of industrial control systems are directly threatened, increasing the risk of downtime and costly recovery efforts. Confidentiality is also impacted as attackers gain unauthorized access to system controls. Given the critical role of SCADA systems in European industrial environments, this vulnerability could facilitate sabotage, espionage, or ransomware attacks. The lack of authentication and user interaction requirements heightens the threat, making it easier for remote attackers to exploit the vulnerability without insider access or social engineering. Consequently, the vulnerability poses a significant risk to the stability and security of European critical infrastructure.
Mitigation Recommendations
To mitigate CVE-2026-25752, European organizations should immediately upgrade FUXA installations to version 1.2.10 or later, where the authorization bypass flaw is patched. Beyond patching, organizations should implement strict network segmentation to isolate SCADA/HMI systems from general IT networks and the internet, reducing exposure to remote attacks. Deploy WebSocket traffic monitoring and anomaly detection to identify unauthorized or suspicious commands targeting device tags or communication drivers. Enforce strong access controls and multi-factor authentication for all management interfaces, even if the vulnerability bypasses some controls, to limit attack surface. Regularly audit and review device tag configurations and communication driver statuses for unexpected changes. Employ intrusion detection and prevention systems tailored for industrial protocols to detect exploitation attempts. Additionally, maintain up-to-date incident response plans specific to ICS environments to quickly contain and remediate any compromise. Training staff on the risks associated with SCADA vulnerabilities and secure configuration best practices is also essential.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-05T18:35:52.356Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69863dc0f9fa50a62f292953
Added to database: 2/6/2026, 7:15:12 PM
Last enriched: 2/14/2026, 12:12:19 PM
Last updated: 3/23/2026, 3:03:51 PM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.