WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed at either the WebCTRL server or associated
AutomatedLogic controllers. Spoofed packets may be processed as
legitimate.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automatedlogic
Automatedlogic webctrl Server |
|
| Vendors & Products |
Automatedlogic
Automatedlogic webctrl Server |
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate. | |
| Title | Automated Logic WebCTRL Premium Server Authentication Bypass by Spoofing | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-23T15:56:02.688Z
Reserved: 2026-03-12T19:57:03.327Z
Link: CVE-2026-32666
No data.
Status : Awaiting Analysis
Published: 2026-03-21T00:16:26.220
Modified: 2026-03-23T16:16:47.220
Link: CVE-2026-32666
No data.