Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25752: CWE-862: Missing Authorization in frangoteam FUXA

0
Critical
VulnerabilityCVE-2026-25752cvecve-2026-25752cwe-862
Published: Fri Feb 06 2026 (02/06/2026, 19:05:57 UTC)
Source: CVE Database V5
Vendor/Project: frangoteam
Product: FUXA

Description

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An authorization bypass vulnerability in FUXA allows an unauthenticated, remote attacker to modify device tags via WebSockets. Exploitation allows an unauthenticated, remote attacker to bypass role-based access controls and overwrite arbitrary device tags or disable communication drivers, exposing connected ICS/SCADA environments to follow-on actions. This may allow an attacker to manipulate physical processes and disconnected devices from the HMI. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:12:19 UTC

Technical Analysis

CVE-2026-25752 identifies a critical missing authorization vulnerability (CWE-862) in frangoteam's FUXA software, a web-based process visualization tool used in SCADA, HMI, and dashboard environments. The flaw allows unauthenticated remote attackers to bypass role-based access controls by exploiting WebSocket communications, enabling them to modify device tags arbitrarily or disable communication drivers. This vulnerability affects all FUXA versions prior to 1.2.10. The exploitation vector requires no authentication or user interaction, making it highly accessible to attackers. By manipulating device tags or disabling drivers, attackers can interfere with the integrity and availability of connected industrial control systems, potentially causing physical process disruptions or damage. The vulnerability has a CVSS 4.0 score of 9.3, indicating critical severity due to its network attack vector, lack of required privileges, and high impact on confidentiality, integrity, and availability. Although no active exploits have been reported, the risk is significant given the critical nature of SCADA environments. The issue was publicly disclosed on February 6, 2026, and patched in FUXA version 1.2.10. Organizations relying on FUXA for industrial monitoring and control should prioritize patching and implement compensating controls to mitigate exploitation risks.

Potential Impact

The impact of CVE-2026-25752 on European organizations is substantial, especially those operating critical infrastructure such as energy, manufacturing, water treatment, and transportation sectors that utilize SCADA and HMI systems. Successful exploitation can lead to unauthorized modification of device tags or disabling of communication drivers, resulting in loss of control over physical processes. This can cause operational disruptions, safety hazards, equipment damage, and potential environmental harm. The integrity and availability of industrial control systems are directly threatened, increasing the risk of downtime and costly recovery efforts. Confidentiality is also impacted as attackers gain unauthorized access to system controls. Given the critical role of SCADA systems in European industrial environments, this vulnerability could facilitate sabotage, espionage, or ransomware attacks. The lack of authentication and user interaction requirements heightens the threat, making it easier for remote attackers to exploit the vulnerability without insider access or social engineering. Consequently, the vulnerability poses a significant risk to the stability and security of European critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2026-25752, European organizations should immediately upgrade FUXA installations to version 1.2.10 or later, where the authorization bypass flaw is patched. Beyond patching, organizations should implement strict network segmentation to isolate SCADA/HMI systems from general IT networks and the internet, reducing exposure to remote attacks. Deploy WebSocket traffic monitoring and anomaly detection to identify unauthorized or suspicious commands targeting device tags or communication drivers. Enforce strong access controls and multi-factor authentication for all management interfaces, even if the vulnerability bypasses some controls, to limit attack surface. Regularly audit and review device tag configurations and communication driver statuses for unexpected changes. Employ intrusion detection and prevention systems tailored for industrial protocols to detect exploitation attempts. Additionally, maintain up-to-date incident response plans specific to ICS environments to quickly contain and remediate any compromise. Training staff on the risks associated with SCADA vulnerabilities and secure configuration best practices is also essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-05T18:35:52.356Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863dc0f9fa50a62f292953

Added to database: 2/6/2026, 7:15:12 PM

Last enriched: 2/14/2026, 12:12:19 PM

Last updated: 3/23/2026, 3:03:51 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses