WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed at either the WebCTRL server or associated
AutomatedLogic controllers. Spoofed packets may be processed as
legitimate.
For users of supported versions of WebCTRL (WebCTRL 8.5
cumulative releases and later), Automated Logic provides secure
configuration guidance for hardware and software deployments; BACnet
Secure Connect (BACnet/SC) support, which introduces TLS encryption and
mutual authentication; and published best practices for network
segmentation, access control, and secure protocol implementation.
Additional information is available at:
https://www.automatedlogic.com/en/company/security-commitment/