ICONICS WebHMI Directory Traversal Vulnerability
A directory traversal vulnerability in ICONICS WebHMI versions 9 and earlier allows an unauthenticated remote attacker to read arbitrary files from the web server. By crafting HTTP requests with directory traversal sequences (../ or encoded variants), an attacker can bypass path restrictions and access sensitive files such as configuration files, credentials, or process documentation. The vulnerability has a CVSS score of 9.8 (critical) and affects all versions through 9. The vendor has not released a patch; no fixed version is available.
- Network access to WebHMI HTTP port (typically 80 or 443)
- WebHMI version 9 or earlier running
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b5220960-53d2-4333-b69b-e916b5c72163Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.