Under certain conditions, an attacker could bind to the same port used
by WebCTRL. This could allow the attacker to craft and send malicious
packets and impersonate the WebCTRL service without requiring code
injection into the WebCTRL software.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automatedlogic
Automatedlogic webctrl Server |
|
| Vendors & Products |
Automatedlogic
Automatedlogic webctrl Server |
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Under certain conditions, an attacker could bind to the same port used by WebCTRL. This could allow the attacker to craft and send malicious packets and impersonate the WebCTRL service without requiring code injection into the WebCTRL software. | |
| Title | Automated Logic WebCTRL Premium Server Multiple Binds to the Same Port | |
| Weaknesses | CWE-605 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-23T15:56:09.720Z
Reserved: 2026-03-12T19:57:03.300Z
Link: CVE-2026-25086
Updated: 2026-03-23T14:50:16.600Z
Status : Awaiting Analysis
Published: 2026-03-21T00:16:25.683
Modified: 2026-03-23T16:16:43.883
Link: CVE-2026-25086
No data.