Description
Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filtering vulnerability that fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled, allowing configured filter rules to be bypassed. Attackers with network access can inject or observe multicast and broadcast packets that should have been blocked by the firewall.
Published: 2026-04-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in Hirschmann HiLCOS products allows a firewall to fail when filtering IPv4 multicast and broadcast traffic if management IP address filtering is disabled, enabling attackers to inject or observe multicast/broadcast packets that should be blocked by configured rules, thereby bypassing intended traffic restrictions. This weakness is categorized as a lack of proper authorization control (CWE-284).

Affected Systems

Affected products include Hirschmann HiLCOS BAT867, OpenBAT, BAT450 and Wireless LAN Controller (WLC); the affected firmware or software versions are not specified in the public report.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of 0.00004 (0.004%) shows a very low but nonzero probability of exploitation. It is not listed in the CISA KEV catalog, yet the attack remains feasible for adversaries with network access. The likely attack vector is by sending malicious multicast or broadcast frames through the network when management IP address filtering is turned off, leveraging the firewall’s bypass to gain non‑authorized network traffic visibility or injection.

Generated by OpenCVE AI on May 12, 2026 at 23:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware patch released by Hirschmann for the affected HiLCOS devices
  • Ensure that management IP address filtering is enabled or disable multicast/broadcast traffic filtering if it is not required
  • Verify that firewall filtering rules are correctly enforced for multicast and broadcast traffic
  • Monitor network traffic for suspicious multicast or broadcast packets that should normally be blocked

Generated by OpenCVE AI on May 12, 2026 at 23:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belden
Belden hirschmann Hilcos Bat450
Belden hirschmann Hilcos Bat867
Belden hirschmann Hilcos Openbat
Belden hirschmann Hilcos Wlc
Vendors & Products Belden
Belden hirschmann Hilcos Bat450
Belden hirschmann Hilcos Bat867
Belden hirschmann Hilcos Openbat
Belden hirschmann Hilcos Wlc

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filtering vulnerability that fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled, allowing configured filter rules to be bypassed. Attackers with network access can inject or observe multicast and broadcast packets that should have been blocked by the firewall.
Title Hirschmann HiLCOS Layer-2 Firewall Multicast Broadcast Traffic Bypass
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Belden Hirschmann Hilcos Bat450 Hirschmann Hilcos Bat867 Hirschmann Hilcos Openbat Hirschmann Hilcos Wlc
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-12T20:46:14.331Z

Reserved: 2026-04-03T17:40:03.508Z

Link: CVE-2017-20233

cve-icon Vulnrichment

Updated: 2026-04-06T16:50:29.107Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T23:16:59.763

Modified: 2026-04-07T13:20:55.200

Link: CVE-2017-20233

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T23:15:27Z

Weaknesses