Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4436: CWE-306 in GPL Odorizers GPL750 (XL4)

0
High
VulnerabilityCVE-2026-4436cvecve-2026-4436cwe-306
Published: Thu Apr 09 2026 (04/09/2026, 20:04:26 UTC)
Source: CVE Database V5
Vendor/Project: GPL Odorizers
Product: GPL750 (XL4)

Description

CVE-2026-4436 is a high-severity vulnerability in the GPL Odorizers GPL750 (XL4) device, where a low-privileged remote attacker can send Modbus packets to manipulate register values that control odorant injection. This manipulation can cause incorrect amounts of odorant to be injected into a gas line, potentially impacting safety. There is no official patch or remediation level provided by the vendor at this time, and no known exploits have been reported in the wild. The vulnerability involves improper access control (CWE-306) allowing unauthorized modification of critical inputs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 20:35:55 UTC

Technical Analysis

The GPL Odorizers GPL750 (XL4) device is vulnerable to unauthorized remote manipulation via Modbus protocol packets. An attacker with low privileges can alter register values that serve as inputs to the odorant injection logic. This can result in injecting either too much or too little odorant into a gas line, which is a safety-critical function. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and has a CVSS 3.1 score of 8.6, indicating high severity. No patch or official remediation guidance has been published by the vendor, and the device is not a cloud service. No known exploits have been observed in the wild.

Potential Impact

The impact of this vulnerability is high because it allows a remote attacker without privileges to alter the amount of odorant injected into a gas line. Incorrect odorant levels can compromise gas leak detection safety measures, potentially leading to hazardous conditions. There is no impact on confidentiality or availability reported, but the integrity of the odorant injection process is fully compromised.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, organizations should consider restricting network access to the Modbus interface of the GPL750 (XL4) device to trusted sources only and monitor for unauthorized Modbus traffic. No official remediation or temporary fix has been provided by the vendor as of the publication date.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-03-19T19:21:21.967Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69d80a201cc7ad14da1a948e

Added to database: 4/9/2026, 8:20:48 PM

Last enriched: 4/9/2026, 8:35:55 PM

Last updated: 4/9/2026, 9:27:01 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses