Description
WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed at either the WebCTRL server or associated
AutomatedLogic controllers. Spoofed packets may be processed as
legitimate.
Published: 2026-03-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch
AI Analysis

Impact

WebCTRL systems that use BACnet do not perform network‑layer authentication, and no additional validation is performed. The result is that an attacker who can transmit traffic onto the BACnet network can send spoofed packets that the WebCTRL server or connected controllers treat as legitimate, effectively bypassing authentication. This weakness is identified as CWE‑290. Because the spoofed packets are accepted, an attacker could issue unauthorized commands, alter configuration data, or disrupt service, compromising confidentiality, integrity, or availability of the affected systems. The vulnerability enables an attacker to impersonate a trusted BACnet device and gain control over WebCTRL functionality without physically tampering with the hardware. The likely attack vector is network access to the BACnet segment, suggesting a local or LAN‑based intrusion path.

Affected Systems

The affected product is Automated Logic WebCTRL Premium Server. The issue is present in all versions that use standard BACnet, including the end‑of‑life WebCTRL 7 and in any WebCTRL 8.5 cumulative releases or later that have not yet been upgraded to use BACnet/SC with TLS encryption. Customers running older WebCTRL versions or those that have not applied the latest cumulative release may be susceptible until a proper upgrade is performed.

Risk and Exploitability

The CVSS v3 base score of 7.5 indicates a high severity. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need the ability to send traffic over the BACnet network; no public exploit code is documented. However, the high severity combined with the local network access requirement means that a compromised or poorly segmented environment could allow an attacker to hijack control of the WebCTRL server and connected devices.

Generated by OpenCVE AI on March 21, 2026 at 07:38 UTC.

Remediation

Vendor Solution

Automated Logic notes that WebCTRL 7 is end of life and has been out of support since January 27, 2023. Users are advised to upgrade to the latest version of the WebCTRL server application, which supports the more secure BACnet/SC.


OpenCVE Recommended Actions

  • Upgrade to the latest supported WebCTRL release (WebCTRL 8.5 cumulative or newer) which includes BACnet/SC support with TLS encryption, thereby eliminating the lack of network‑layer authentication.
  • Apply Automated Logic’s secure configuration guidance for hardware and software deployments, enabling BACnet/SC and mutual TLS authentication where available.
  • Implement network segmentation and strict access controls to restrict BACnet traffic to authorized devices only, reducing the likelihood of packet spoofing.
  • If an upgrade is not immediately possible, follow Automated Logic’s advice to isolate or harden existing BACnet devices and monitor for anomalous traffic patterns.

Generated by OpenCVE AI on March 21, 2026 at 07:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Automatedlogic
Automatedlogic webctrl Server
Vendors & Products Automatedlogic
Automatedlogic webctrl Server

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.
Title Automated Logic WebCTRL Premium Server Authentication Bypass by Spoofing
Weaknesses CWE-290
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Automatedlogic Webctrl Server
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-03-23T15:56:02.688Z

Reserved: 2026-03-12T19:57:03.327Z

Link: CVE-2026-32666

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T00:16:26.220

Modified: 2026-03-23T16:16:47.220

Link: CVE-2026-32666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:33:46Z

Weaknesses