Impact
A missing authentication check in the ScadaBR 1.2.0 web interface allows an unauthenticated party to send HTTP GET requests that insert arbitrary sensor readings. This flaw permits malicious manipulation of SCADA telemetry, potentially misleading operators or triggering unsafe actions.
Affected Systems
The vulnerability affects ScadaBR's ScadaBR product version 1.2.0. No other versions are listed as affected.
Risk and Exploitability
The flaw has a CVSS score of 8.8 and lacks an EPSS rating, indicating no public exploitation reports to date. The vulnerability is not listed in the CISA KEV catalog. The attack vector is likely remote, accessible over HTTP, and requires no prior authentication. An attacker could simply craft a request to an exposed URL to alter sensor values.
OpenCVE Enrichment