Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32666: CWE-290 in Automated Logic WebCTRL Premium Server

0
High
VulnerabilityCVE-2026-32666cvecve-2026-32666cwe-290
Published: Fri Mar 20 2026 (03/20/2026, 23:17:29 UTC)
Source: CVE Database V5
Vendor/Project: Automated Logic
Product: WebCTRL Premium Server

Description

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/28/2026, 21:45:04 UTC

Technical Analysis

CVE-2026-32666 identifies a vulnerability in Automated Logic's WebCTRL Premium Server, a building automation system that communicates using the BACnet protocol. BACnet inherently lacks network layer authentication, relying on the assumption of a trusted network environment. WebCTRL does not implement additional validation or authentication mechanisms for BACnet traffic, which means that any BACnet packet received is processed without verifying its legitimacy. An attacker with access to the network segment where WebCTRL or its controllers operate can craft and send spoofed BACnet packets. These spoofed packets can be accepted as valid commands, allowing the attacker to manipulate building automation functions such as HVAC controls, lighting, or security systems. The vulnerability is classified under CWE-290 (Authentication Bypass by Spoofing) and has a CVSS 3.1 base score of 7.5, indicating high severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts integrity (I:H) without affecting confidentiality or availability. Although no public exploits are known at this time, the lack of authentication and the critical nature of building automation systems make this a significant risk. The vulnerability affects all versions of WebCTRL Premium Server as indicated, and no patches or mitigations are currently linked, emphasizing the need for compensating controls.

Potential Impact

The primary impact of this vulnerability is on the integrity of building automation systems managed by WebCTRL Premium Server. An attacker exploiting this flaw can send unauthorized commands to control HVAC, lighting, or other critical building functions, potentially causing operational disruptions, safety hazards, or damage to equipment. While confidentiality and availability are not directly impacted, the ability to manipulate system behavior can lead to indirect availability issues (e.g., disabling climate control in sensitive environments). Organizations relying on WebCTRL for critical infrastructure, commercial buildings, or industrial facilities face risks of unauthorized control, which could be leveraged for sabotage, espionage, or disruption. The ease of exploitation—requiring only network access without authentication—raises the threat level, especially in environments where network segmentation or access controls are weak. The lack of known exploits suggests the vulnerability is not yet widely weaponized, but the potential for damage is significant if exploited.

Mitigation Recommendations

To mitigate CVE-2026-32666, organizations should implement strict network segmentation to isolate WebCTRL systems and BACnet traffic from untrusted networks and users. Deploying firewalls or access control lists (ACLs) to restrict BACnet protocol traffic only to authorized devices can reduce exposure. Network monitoring and anomaly detection should be enhanced to identify unusual BACnet packet patterns or spoofing attempts. Where possible, use VPNs or encrypted tunnels to protect BACnet communications over broader networks. Automated Logic or third-party vendors should be consulted for any available patches or firmware updates that add authentication or validation features. In the absence of patches, consider deploying compensating controls such as intrusion prevention systems (IPS) with BACnet protocol awareness. Regularly audit and review network access permissions and ensure that only trusted personnel have access to the building automation network. Finally, develop incident response plans specific to building automation system compromises to quickly detect and respond to exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-12T19:57:03.327Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bdd7ec1188d0bb0cbf88c8

Added to database: 3/20/2026, 11:27:40 PM

Last enriched: 3/28/2026, 9:45:04 PM

Last updated: 5/1/2026, 6:47:25 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses