Description
Hirschmann HiLCOS OpenBAT and BAT450 products contain a firewall bypass vulnerability in IPv6 IPsec deployments that allows traffic from VPN connections to bypass configured firewall rules. Attackers can exploit this vulnerability by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while simultaneously using an IPv6 Internet connection to circumvent firewall policy enforcement.
Published: 2026-04-03
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Bypasses firewall rules for IPv6 IPsec VPN traffic
Action: Immediate Patch
AI Analysis

Impact

Hirschmann HiLCOS OpenBAT and BAT450 devices have a flaw that lets attackers avoid firewall configurations when they set up IPv6 IPsec VPN connections. The CVE allows an adversary to create IKEv1 or IKEv2 sessions that carry traffic directly into the protected network, effectively bypassing any packet filtering rules. This can expose internal hosts to undetected intrusion or data exfiltration because the firewall no longer sees the packets as originating from a prohibited source.

Affected Systems

Devices from Hirschmann under the HiLCOS OpenBAT line, including the BAT450 series. The vulnerability is present in all firmware versions of these models that still support IPv6 IPsec.

Risk and Exploitability

With a CVSS score of 9.3 the issue is considered critical. Exploitation requires only the ability to negotiate an IPv6 IPsec connection, which is typically achievable with remote network access and legitimate VPN credentials. Attackers can manipulate the connection parameters, so the exploit does not need privileged local access. The vulnerability is not listed in the CISA KEV catalog, and no EPSS score is available, but the high severity indicates a strong potential for real-world attacks.

Generated by OpenCVE AI on April 4, 2026 at 01:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Belden/Hirschmann product documentation and apply the latest firmware update that patches the IPv6 IPsec firewall bypass. If an update is not yet released, disable or remove IPv6 IPsec support on the device until a fix is available. Consider enforcing additional filtering rules to reject VPN traffic that originates from external sources. Monitor device logs for unusual IPsec negotiations or traffic that appears to bypass the firewall.

Generated by OpenCVE AI on April 4, 2026 at 01:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Belden
Belden hirschmann Hilcos Openbat
Vendors & Products Belden
Belden hirschmann Hilcos Openbat

Mon, 06 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description Hirschmann HiLCOS OpenBAT and BAT450 products contain a firewall bypass vulnerability in IPv6 IPsec deployments that allows traffic from VPN connections to bypass configured firewall rules. Attackers can exploit this vulnerability by establishing IPv6 IPsec connections (IKEv1 or IKEv2) while simultaneously using an IPv6 Internet connection to circumvent firewall policy enforcement.
Title Hirschmann HiLCOS OpenBAT BAT450 IPv6 IPsec Firewall Bypass
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Belden Hirschmann Hilcos Openbat
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-06T13:17:07.744Z

Reserved: 2026-04-03T16:46:37.018Z

Link: CVE-2021-4477

cve-icon Vulnrichment

Updated: 2026-04-06T13:17:02.444Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T23:17:01.043

Modified: 2026-04-07T13:20:55.200

Link: CVE-2021-4477

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T22:21:42Z

Weaknesses