Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25872: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in ALBRECHT JUNG GMBH & CO. KG JUNG Smart Panel 5.1 KNX

0
Medium
VulnerabilityCVE-2026-25872cvecve-2026-25872cwe-22
Published: Tue Feb 10 2026 (02/10/2026, 22:25:56 UTC)
Source: CVE Database V5
Vendor/Project: ALBRECHT JUNG GMBH & CO. KG
Product: JUNG Smart Panel 5.1 KNX

Description

JUNG Smart Panel KNX firmware version L1.12.22 and prior contain an unauthenticated path traversal vulnerability in the embedded web interface. The application fails to properly validate file path input, allowing remote, unauthenticated attackers to access arbitrary files on the underlying filesystem within the context of the web server. This may result in disclosure of system configuration files and other sensitive information.

AI-Powered Analysis

AILast updated: 02/18/2026, 09:48:52 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25872 affects the JUNG Smart Panel 5.1 KNX firmware versions L1.12.22 and prior. It is classified as a CWE-22 path traversal flaw, where the embedded web interface fails to properly sanitize or restrict file path inputs. This allows an unauthenticated remote attacker to craft specially designed requests that traverse directories on the device's filesystem, bypassing intended access controls. As a result, attackers can read arbitrary files, including sensitive configuration files that may contain credentials, network settings, or other critical information. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality only (VC:L), with no impact on integrity or availability. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread deployment of JUNG Smart Panels in building automation systems pose a significant risk. Attackers could leverage disclosed information for further attacks or lateral movement within a network. The lack of a patch at the time of reporting necessitates immediate compensating controls to reduce exposure. Given the device's role in smart building management, confidentiality breaches could lead to privacy violations or facilitate sabotage of building systems.

Potential Impact

For European organizations, particularly those managing smart buildings, commercial facilities, or critical infrastructure using JUNG Smart Panel 5.1 KNX devices, this vulnerability presents a moderate confidentiality risk. Unauthorized disclosure of configuration files could expose network credentials, device settings, or integration details with other building management systems. This information could be used by attackers to escalate privileges, conduct further reconnaissance, or disrupt building operations indirectly. Since the vulnerability is exploitable without authentication, attackers can target exposed devices over the network, increasing the attack surface. The impact is heightened in sectors such as energy management, healthcare facilities, and government buildings where building automation security is critical. Additionally, the exposure of sensitive data may lead to regulatory compliance issues under GDPR if personal or operational data is compromised. While the vulnerability does not directly affect system integrity or availability, the potential for information leakage and subsequent attacks makes it a significant concern for European organizations relying on these devices.

Mitigation Recommendations

1. Immediately restrict network access to JUNG Smart Panel devices by implementing network segmentation and firewall rules that limit access to trusted management networks only. 2. Monitor network traffic to and from the devices for unusual or unauthorized access attempts, especially HTTP requests containing suspicious path traversal patterns (e.g., '../'). 3. Disable or restrict the embedded web interface if not required or replace it with a more secure management method. 4. Engage with ALBRECHT JUNG GMBH & CO. KG to obtain firmware updates or patches addressing this vulnerability as soon as they become available. 5. Implement strong authentication and access control measures on the management network to reduce exposure. 6. Conduct regular security audits and vulnerability assessments on building automation systems to identify and remediate similar issues proactively. 7. Educate facility management and IT teams about the risks and indicators of compromise related to this vulnerability. 8. If possible, deploy intrusion detection systems capable of detecting path traversal attack signatures targeting these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-06T19:12:03.464Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698bb5374b57a58fa12f9f56

Added to database: 2/10/2026, 10:46:15 PM

Last enriched: 2/18/2026, 9:48:52 AM

Last updated: 2/21/2026, 12:22:10 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats