Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32666: CWE-290 in Automated Logic WebCTRL Premium Server

0
High
VulnerabilityCVE-2026-32666cvecve-2026-32666cwe-290
Published: Fri Mar 20 2026 (03/20/2026, 23:17:29 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL Premium Server

Description

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 23:31:46 UTC

Technical Analysis

CVE-2026-32666 identifies a vulnerability in Automated Logic's WebCTRL Premium Server, a building automation system that communicates using the BACnet protocol. BACnet, widely used in building automation, inherently lacks network layer authentication, meaning devices accept BACnet packets without verifying the sender's identity. WebCTRL does not implement additional validation or authentication mechanisms to compensate for this protocol weakness. Consequently, an attacker with access to the network segment where WebCTRL or its associated AutomatedLogic controllers operate can craft and send spoofed BACnet packets. These spoofed packets may be accepted and processed as legitimate commands or data by the WebCTRL server or controllers. This can lead to unauthorized manipulation of building automation functions such as HVAC, lighting, or security systems. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS 3.1 base score of 7.5 (high), reflecting that it is remotely exploitable over the network without any privileges or user interaction, and impacts the integrity of the system. No patches or mitigations have been officially released at the time of publication, and no active exploitation has been reported. The vulnerability highlights the risks of relying on BACnet's insecure protocol design without additional security controls in critical automation environments.

Potential Impact

The impact of CVE-2026-32666 is significant for organizations relying on Automated Logic's WebCTRL Premium Server for building automation and control. Successful exploitation can allow attackers to spoof BACnet packets, leading to unauthorized commands being executed on the WebCTRL server or connected controllers. This can compromise the integrity of building systems, potentially causing unauthorized changes to HVAC settings, lighting controls, access systems, or other critical facility operations. Such manipulation could disrupt occupant comfort, safety, or energy management, and in sensitive environments like data centers, hospitals, or industrial plants, could lead to operational downtime or safety hazards. Since the vulnerability does not affect confidentiality or availability directly but impacts integrity, attackers could covertly alter system behavior without detection. The lack of authentication and ease of exploitation over the network increases risk, especially in environments where network segmentation or monitoring is insufficient. Organizations with large deployments of WebCTRL in critical infrastructure or commercial buildings face increased risk of targeted attacks or insider threats leveraging this vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-32666, organizations should implement network-level protections to compensate for BACnet's lack of authentication. This includes strict network segmentation to isolate WebCTRL servers and BACnet devices from untrusted networks and users. Deploying VLANs and access control lists (ACLs) to restrict BACnet traffic only to authorized devices reduces attack surface. Network monitoring and intrusion detection systems should be configured to detect anomalous BACnet traffic or spoofing attempts. Where possible, use VPNs or encrypted tunnels to secure BACnet communications over untrusted networks. Organizations should also engage with Automated Logic for updates or patches addressing this vulnerability and apply them promptly once available. Additionally, implementing strong physical security controls to prevent unauthorized network access and conducting regular security audits of building automation networks are critical. Finally, educating operational technology (OT) staff about this vulnerability and best practices for securing BACnet environments will enhance overall defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T19:57:03.327Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdd7ec1188d0bb0cbf88c8

Added to database: 3/20/2026, 11:27:40 PM

Last enriched: 3/20/2026, 11:31:46 PM

Last updated: 3/21/2026, 1:05:52 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses