CVE-2026-32666 PUBLISHED

Automated Logic WebCTRL Premium Server Authentication Bypass by Spoofing

Assigner: icscert
Reserved: 12.03.2026 Published: 20.03.2026 Updated: 20.03.2026

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS Score: 7.5

Product Status

Vendor Automated Logic
Product WebCTRL Premium Server
Versions Default: unaffected
  • affected from 0 to v8.5 (excl.)

Solutions

For users of supported versions of WebCTRL (WebCTRL 8.5 cumulative releases and later), Automated Logic provides secure configuration guidance for hardware and software deployments; BACnet Secure Connect (BACnet/SC) support, which introduces TLS encryption and mutual authentication; and published best practices for network segmentation, access control, and secure protocol implementation. Additional information is available at:  https://www.automatedlogic.com/en/company/security-commitment/

Credits

  • Jonathan Lee, Thuy D. Nguyen, and Neil C. Rowe of the Naval Postgraduate School reported this vulnerability to CISA. finder

References

Problem Types

  • CWE-290 CWE