WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed at either the WebCTRL server or associated
AutomatedLogic controllers. Spoofed packets may be processed as
legitimate.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-21 00:16
Updated : 2026-03-23 16:16
NVD link : CVE-2026-32666
Mitre link : CVE-2026-32666
CVE.ORG link : CVE-2026-32666
JSON object : View
Products Affected
No product.
CWE
CWE-290
Authentication Bypass by Spoofing
