The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in versions up to and including 8.5 allows a malicious actor to bypass intended access restrictions and expose sensitive information via the

web based building automation server.
Advisories

No advisories yet.

Fixes

Solution

Upgrade to the latest version of ALC WebCTRL or Carrier i-Vu.


Workaround

No workaround given by the vendor.

History

Fri, 28 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Carrier
Carrier automatedlogic Webctrl
Carrier i-vu
Vendors & Products Carrier
Carrier automatedlogic Webctrl
Carrier i-vu

Thu, 27 Nov 2025 01:15:00 +0000

Type Values Removed Values Added
Description The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in versions up to and including 8.5 allows a malicious actor to bypass intended access restrictions and expose sensitive information via the web based building automation server.
Title ALC WebCTRL Carrier i-Vu Access Control Bypass
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published:

Updated: 2025-11-28T19:34:22.248Z

Reserved: 2024-05-30T17:38:43.955Z

Link: CVE-2024-5539

cve-icon Vulnrichment

Updated: 2025-11-28T14:41:23.582Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-27T01:15:46.120

Modified: 2025-12-01T15:39:33.110

Link: CVE-2024-5539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-27T16:26:27Z