Sauter moduWeb Vision Vulnerabilities
Sauter moduWeb Vision versions before 1.6.0 contain multiple critical vulnerabilities: unencrypted data transmission (CWE-319) exposes credentials and configuration data to network eavesdropping; missing input validation (CWE-79) allows cross-site scripting to inject malicious commands; and insufficient access control (CWE-311) permits unauthenticated access to protected functions. An attacker with network access can intercept communications, modify facility automation settings, capture operator credentials, or disable monitoring capabilities. The vendor has stated no fix will be provided for this end-of-life product.
- Network access to the moduWeb Vision web interface (typically TCP port 80 or 443)
- No credentials required for exploitation of authentication bypass
- Device must be reachable from attacker's network segment
/api/v1/advisories/7ea34692-fa37-4c02-9fdc-24a79ad2938aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.