CVE-2026-4436: CWE-306 in GPL Odorizers GPL750 (XL4)
CVE-2026-4436 is a high-severity vulnerability in the GPL Odorizers GPL750 (XL4) device, where a low-privileged remote attacker can send Modbus packets to manipulate register values that control odorant injection. This manipulation can cause incorrect amounts of odorant to be injected into a gas line, potentially impacting safety. There is no official patch or remediation level provided by the vendor at this time, and no known exploits have been reported in the wild. The vulnerability involves improper access control (CWE-306) allowing unauthorized modification of critical inputs.
AI Analysis
Technical Summary
The GPL Odorizers GPL750 (XL4) device is vulnerable to unauthorized remote manipulation via Modbus protocol packets. An attacker with low privileges can alter register values that serve as inputs to the odorant injection logic. This can result in injecting either too much or too little odorant into a gas line, which is a safety-critical function. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS 3.1 score of 8.6, indicating high severity. No patch or official remediation guidance has been published by the vendor, and the device is not a cloud service. No known exploits have been observed in the wild.
Potential Impact
The impact of this vulnerability is high because it allows a remote attacker without privileges to alter the amount of odorant injected into a gas line. Incorrect odorant levels can compromise gas leak detection safety measures, potentially leading to hazardous conditions. There is no impact on confidentiality or availability reported, but the integrity of the odorant injection process is fully compromised.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, organizations should consider restricting network access to the Modbus interface of the GPL750 (XL4) device to trusted sources only and monitor for unauthorized Modbus traffic. No official remediation or temporary fix has been provided by the vendor as of the publication date.
CVE-2026-4436: CWE-306 in GPL Odorizers GPL750 (XL4)
Description
CVE-2026-4436 is a high-severity vulnerability in the GPL Odorizers GPL750 (XL4) device, where a low-privileged remote attacker can send Modbus packets to manipulate register values that control odorant injection. This manipulation can cause incorrect amounts of odorant to be injected into a gas line, potentially impacting safety. There is no official patch or remediation level provided by the vendor at this time, and no known exploits have been reported in the wild. The vulnerability involves improper access control (CWE-306) allowing unauthorized modification of critical inputs.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The GPL Odorizers GPL750 (XL4) device is vulnerable to unauthorized remote manipulation via Modbus protocol packets. An attacker with low privileges can alter register values that serve as inputs to the odorant injection logic. This can result in injecting either too much or too little odorant into a gas line, which is a safety-critical function. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS 3.1 score of 8.6, indicating high severity. No patch or official remediation guidance has been published by the vendor, and the device is not a cloud service. No known exploits have been observed in the wild.
Potential Impact
The impact of this vulnerability is high because it allows a remote attacker without privileges to alter the amount of odorant injected into a gas line. Incorrect odorant levels can compromise gas leak detection safety measures, potentially leading to hazardous conditions. There is no impact on confidentiality or availability reported, but the integrity of the odorant injection process is fully compromised.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, organizations should consider restricting network access to the Modbus interface of the GPL750 (XL4) device to trusted sources only and monitor for unauthorized Modbus traffic. No official remediation or temporary fix has been provided by the vendor as of the publication date.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2026-03-19T19:21:21.967Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69d80a201cc7ad14da1a948e
Added to database: 4/9/2026, 8:20:48 PM
Last enriched: 4/9/2026, 8:35:55 PM
Last updated: 4/9/2026, 9:27:01 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.