All Intelligence

Vulnerabilities

CVE analysis, exploit assessments, and patch guidance for critical security vulnerabilities.

240 items

criticalVulnerabilityActive

OpenC3 COSMOS Script Runner: Privilege Escalation via Docker Network Access and Credential Exposure

Authenticated users with script execution permissions can bypass API access controls by directly connecting to internal services (Redis, S3) via shared Docker network, escalating privileges to administrative level. This PoC demonstrates the exploitation chain requires minimal effort once script execution is granted.

GHSA-2wvh-87g2-89hr
openc3inc/openc3-cosmos-script-runner-api
criticalVulnerabilityActive

Protobuf.js RCE via PoC Publication: Supply Chain Risk for JavaScript Ecosystems

A critical remote code execution flaw in protobuf.js has been exploited with published proof-of-concept code, enabling arbitrary JavaScript execution in applications using this widely-deployed serialisation library. This poses immediate risk to any Node.js or browser-based system consuming untrusted Protocol Buffer messages.

protobuf.js, JavaScript applications, Node.js services +1
highVulnerabilityEmerging

Anritsu Remote Spectrum Monitor: Unauthenticated Configuration Alteration in Critical RF Test Equipment

CVE-2026-3356 affects all versions of Anritsu's Remote Spectrum Monitor series, allowing network-accessible attackers to modify operational settings, exfiltrate signal intelligence, or cause denial of service. The vulnerability impacts spectrum analysis infrastructure used in telecommunications and defence sectors.

CVE-2026-3356
Anritsu Remote Spectrum Monitor MS27100A, Anritsu Remote Spectrum Monitor MS27101A, Anritsu Remote Spectrum Monitor MS27102A +1
criticalVulnerabilityActive

Authentication & Authorization Bypass in mpp Payment Handler - Request Replay and Session Hijacking

mpp versions before 0.8.0 contain multiple authentication bypass vulnerabilities allowing attackers to replay payment requests, hijack session channels, and manipulate fee responsibility. This PoC matters for defenders as it demonstrates systemic weaknesses in request validation and session management that affect financial transaction integrity.

GHSA-fxc9-7j2w-vx54
mpp/<0.8.0
highVulnerabilityEmerging

Multi-tenant SMS data exposure via parameter tampering in OpenCode messaging platform

OpenCode Systems OC Messaging and USSD Gateway versions 6.32.2 contain an insecure direct object reference (IDOR) vulnerability allowing authenticated users to access SMS messages from other tenants by manipulating company or tenant identifiers. This affects multi-tenant deployments handling sensitive communications.

CVE-2025-70614
OpenCode Systems OC Messaging 6.32.2, OpenCode Systems USSD Gateway 6.32.2
criticalVulnerabilityActive

OpenTelemetry RMI Deserialization RCE - Unsafe Gadget Chain Exploitation Vector

OpenTelemetry Java instrumentation versions <2.26.1 fail to apply serialization filters on RMI deserialization, allowing unauthenticated remote code execution when RMI endpoints are network-accessible and gadget chains are present. This affects production observability infrastructure with potential for supply-chain compromise.

CVE-2026-33701
OpenTelemetry/opentelemetry-java-instrumentation (<2.26.1)
criticalVulnerabilityEmerging

Deserialization RCE in Schneider Electric Foxboro DCS Workstations: Critical ICS Risk in Distributed Control Systems

Schneider Electric patched a critical untrusted deserialization vulnerability in EcoStruxure Foxboro DCS workstations and servers that enables remote code execution. The vulnerability affects control software on engineering stations but spares runtime components, yet poses significant risk to DCS environments managing critical infrastructure.

Schneider Electric EcoStruxure Foxboro DCS (workstations and servers)
criticalVulnerabilityActive

Critical Privilege Escalation in Schneider Electric Plant iT/Brewmaxx Enables RCE Across Industrial Operations

Schneider Electric Plant iT/Brewmaxx versions 9.60 and above contain four critical vulnerabilities (CVSS 9.9) enabling privilege escalation to remote code execution. Organizations using this brewing and plant management software face immediate risk of full system compromise.

CVE-2025-49844CVE-2025-46817CVE-2025-46818CVE-2025-46819
Schneider Electric Plant iT/Brewmaxx 9.60 and later
criticalVulnerabilityActive

Maximum-Severity Quest KACE SMA Exploitation Campaign Signals Internet-Exposed Admin Tools as Prime Targets

Threat actors are actively exploiting CVE-2025-32975, a critical remote code execution flaw in Quest KACE Systems Management Appliance (SMA), against unpatched internet-exposed instances since March 2026. SMA is enterprise-grade IT infrastructure management software, making compromises particularly damaging.

CVE-2025-32975
Quest KACE Systems Management Appliance (SMA)
criticalVulnerabilityActive

CISA Emergency Patch Directive for Critical Cisco FMC RCE – Federal Mandate Signals Active Exploitation Risk

CISA has issued an emergency patching order for CVE-2026-20131, a maximum-severity vulnerability in Cisco Secure Firewall Management Center, requiring federal agencies to remediate by March 22, 2026. This indicates either active exploitation or imminent threat intelligence suggesting weaponization.

CVE-2026-20131
Cisco Secure Firewall Management Center (FMC)
criticalVulnerabilityEmerging

Critical RCE in Schneider Electric EcoStruxure Automation Expert - Engineering Workstation Compromise Risk

Schneider Electric EcoStruxure Automation Expert versions ≤25.0.1 contain a vulnerability enabling arbitrary command execution on engineering workstations. This threatens the integrity of critical industrial control systems across discrete, hybrid, and continuous manufacturing processes.

Schneider Electric EcoStruxure Automation Expert versions <25.0.1 and 25.0.1
highVulnerabilityActive

Critical XSS and DoS Vulnerabilities in Schneider Electric Modicon Industrial Controllers Expose OT Environments

Schneider Electric Modicon Controllers (M241, M251, M258, M262, LMC058) contain XSS/open redirect and denial-of-service vulnerabilities affecting web interfaces. Exploitation could lead to account takeover, browser-based code execution, or operational disruption in industrial environments.

Schneider Electric Modicon M241 (versions < 5.4.13.12), Schneider Electric Modicon M251 (versions < 5.4.13.12), Schneider Electric Modicon M258 (all firmware versions) +2
highVulnerabilityActive

Apple Introduces Background Security Improvements model to patch WebKit vulnerability without full OS update

Apple released a new Background Security Improvements update addressing WebKit CVE-2026-20643 across iOS, iPadOS, and macOS without requiring full operating system upgrades. This represents a significant shift in Apple's patching strategy, enabling faster security remediation for critical browser engine vulnerabilities.

CVE-2026-20643
Apple iPhone, Apple iPad, Apple Mac
criticalVulnerabilityActive

CODESYS Runtime Vulnerability in Festo Automation Suite Enables Unauthenticated Code Execution

A vulnerability in CODESYS runtime components bundled with Festo Automation Suite prior to v2.8.0.138 allows unauthenticated remote attackers to execute arbitrary code on industrial automation systems. This affects a widely-used ICS development platform with significant operational technology footprint.

Festo Automation Suite (versions < 2.8.0.138), CODESYS Development System 3.0, CODESYS Development System 3.5.16.10
criticalVulnerabilityActive

Schneider Electric SCADAPack RTU Authentication Bypass Exposes Critical ICS Infrastructure

Schneider Electric SCADAPack x70 RTUs and RemoteConnect products contain an authentication or access control vulnerability affecting firmware versions prior to 9.12.2, potentially allowing unauthorized remote access to critical industrial control systems with downstream impacts on device integrity and availability.

Schneider Electric SCADAPack 47xi, Schneider Electric SCADAPack 47x, Schneider Electric SCADAPack 57x +1
highVulnerabilityEmerging

Schneider Electric DCE Hard-Coded Credentials Enable Authenticated RCE in Critical Infrastructure Monitoring

Schneider Electric's EcoStruxure Data Center Expert contains hard-coded credentials that, combined with an optional SOCKS proxy feature, allow authenticated attackers to compromise the monitoring platform. This threatens visibility and control of critical data center infrastructure.

Schneider Electric EcoStruxure IT Data Center Expert ≤9.0, Schneider Electric EcoStruxure IT Data Center Expert 9.1
criticalVulnerabilityActive

Parse Server OAuth2 Singleton State Leakage - Concurrent Provider Token Validation Bypass

Parse Server's OAuth2 adapter uses a shared singleton instance across multiple providers, allowing concurrent authentication requests to cause token validation confusion where one provider's token may be validated against another provider's policy, potentially leading to unauthorized access.

CVE-2026-32242
Parse Community/Parse Server (versions < 8.6.37 and < 9.6.0-alpha.11)
criticalVulnerabilityEmerging

Siemens SIMATIC S7-1500 Code Injection via Malicious Trace Files - Critical OT Supply Chain Risk

Siemens SIMATIC S7-1500 industrial controllers contain a code injection vulnerability exploitable through specially crafted trace files in the web interface, affecting multiple drive controller and edge device variants. This represents a critical remote code execution vector in operational technology environments.

CVE-2025-40943
Siemens SIMATIC Drive Controller CPU 1504D TF, Siemens SIMATIC Drive Controller CPU 1507D TF, Siemens SIMATIC ET 200SP CPU 1510SP F-1 PN
highVulnerabilityActive

IoT Administrative Credential Exposure: Factory Default and Weak Authentication Paradigm

IoT devices shipping with administrative credentials or defaulting to admin-level access create a persistent authentication bypass that enables complete device compromise. This represents a fundamental architectural failure in IoT security that affects entire device classes and is difficult to remediate post-deployment.

IoT devices (generic class), Smart home devices, Industrial IoT +1
criticalVulnerabilityEmerging

AirSnitch: Cross-Layer Wi-Fi Desynchronization Enables Full MitM Against All Network Scales

AirSnitch exploits fundamental layer 1-2 binding failures in Wi-Fi to perform bidirectional machine-in-the-middle attacks across home, office, and enterprise networks without requiring network membership or proximity constraints. The attack breaks core 802.11 assumptions about client identity synchronization.

Wi-Fi networks (802.11 standard), Home networks, Office networks +1
criticalVulnerabilityActive

Critical Vulnerabilities in Copeland XWEB Devices Enable Remote Code Execution

Multiple critical vulnerabilities in Copeland XWEB and XWEB Pro devices allow attackers to bypass authentication, cause denial-of-service, memory corruption, and execute arbitrary code, posing significant risks to affected systems.

CVE-2026-25085CVE-2026-21718CVE-2026-24663CVE-2026-21389CVE-2026-25111CVE-2026-20742CVE-2026-24517CVE-2026-25195CVE-2026-20910CVE-2026-24689CVE-2026-25109CVE-2026-20902CVE-2026-24695CVE-2026-25105CVE-2026-24452CVE-2026-23702CVE-2026-25721CVE-2026-20764CVE-2026-25196CVE-2026-25037CVE-2026-22877CVE-2026-20797CVE-2026-3037
Copeland XWEB 300D PRO <=1.12.1, Copeland XWEB 500D PRO <=1.12.1