Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25893: CWE-285: Improper Authorization in frangoteam FUXA

0
Critical
VulnerabilityCVE-2026-25893cvecve-2026-25893cwe-285cwe-287
Published: Mon Feb 09 2026 (02/09/2026, 22:26:45 UTC)
Source: CVE Database V5
Vendor/Project: frangoteam
Product: FUXA

Description

CVE-2026-25893 is a critical authentication bypass vulnerability in frangoteam's FUXA, a web-based SCADA/HMI/dashboard software. Versions prior to 1. 2. 10 allow unauthenticated remote attackers to gain administrative access through the heartbeat refresh API. This access enables execution of arbitrary code on the server, posing severe risks to confidentiality, integrity, and availability. The vulnerability has a CVSS 4. 0 base score of 10. 0, reflecting its critical severity and ease of exploitation without authentication or user interaction. No known exploits are currently reported in the wild. European organizations using vulnerable FUXA versions, especially in industrial control and process visualization environments, face significant operational and security risks.

AI-Powered Analysis

AILast updated: 02/09/2026, 23:01:48 UTC

Technical Analysis

CVE-2026-25893 identifies a critical improper authorization vulnerability (CWE-285) in frangoteam's FUXA software, a web-based process visualization tool commonly used in SCADA, HMI, and dashboard applications. The flaw exists in versions prior to 1.2.10 and allows unauthenticated remote attackers to bypass authentication controls via the heartbeat refresh API endpoint. This API, intended for routine status updates, fails to enforce proper authorization checks, enabling attackers to gain administrative privileges without any credentials. Once administrative access is obtained, the attacker can execute arbitrary code on the server hosting FUXA, potentially leading to full system compromise. The vulnerability is rated with a CVSS 4.0 score of 10.0, indicating critical severity due to network attack vector, no required privileges or user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability affects all deployments running vulnerable versions, particularly those integrated into industrial control systems and critical infrastructure monitoring. Although no public exploits have been reported yet, the ease of exploitation and potential impact make this a high-risk vulnerability. The vendor has addressed the issue in FUXA version 1.2.10, which enforces proper authorization on the heartbeat refresh API and prevents unauthorized administrative access and code execution.

Potential Impact

The impact on European organizations using vulnerable FUXA versions is substantial. Given FUXA's role in SCADA and HMI environments, exploitation could lead to unauthorized control over industrial processes, data manipulation, and disruption of critical infrastructure operations. Confidentiality breaches could expose sensitive operational data, while integrity violations may cause incorrect process visualization or control commands, potentially leading to physical damage or safety hazards. Availability could also be compromised if attackers disrupt or disable the FUXA service. European sectors such as manufacturing, energy, water treatment, and transportation that rely on process visualization tools are at heightened risk. The ability to execute arbitrary code remotely without authentication significantly raises the threat level, enabling attackers to deploy malware, ransomware, or conduct espionage. The lack of known exploits in the wild currently provides a window for mitigation, but the critical nature demands immediate attention to prevent potential attacks.

Mitigation Recommendations

European organizations should promptly upgrade all FUXA deployments to version 1.2.10 or later, where the vulnerability is patched. Until upgrades can be completed, organizations should restrict network access to the heartbeat refresh API endpoint using firewall rules or network segmentation to limit exposure to untrusted networks. Implement strict monitoring and logging of API access to detect anomalous or unauthorized requests. Employ intrusion detection systems (IDS) tailored to recognize exploitation attempts targeting FUXA. Conduct thorough audits of existing FUXA installations to identify vulnerable versions and remove or isolate outdated instances. Additionally, enforce strong network-level access controls around SCADA and HMI systems, including VPNs and zero-trust principles, to reduce attack surface. Regularly update and test incident response plans specific to industrial control system compromises. Collaboration with vendors and sharing threat intelligence within European cybersecurity communities can enhance preparedness and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.130Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a63b84b57a58fa17688d1

Added to database: 2/9/2026, 10:46:16 PM

Last enriched: 2/9/2026, 11:01:48 PM

Last updated: 2/9/2026, 11:56:59 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats