๐Ÿ” CVE Alert

CVE-2026-32666

HIGH 7.5

Automated Logic WebCTRL Premium Server Authentication Bypass by Spoofing

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

CWE CWE-290
Vendor automated logic
Product webctrl premium server
Published Mar 20, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for automated logic webctrl premium server

Be the first to know when new high vulnerabilities affecting automated logic webctrl premium server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None

Affected Versions

Automated Logic / WebCTRL Premium Server
0 < v8.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
automatedlogic.com: https://www.automatedlogic.com/en/company/security-commitment/ cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-26-078-08 github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-078-08.json

Credits

Jonathan Lee, Thuy D. Nguyen, and Neil C. Rowe of the Naval Postgraduate School reported this vulnerability to CISA.