Automated Logic Corporation WebCTRL, i-VU, SiteScan
Automated Logic Corporation WebCTRL, i-Vu, and SiteScan Web products contain multiple vulnerabilities that allow authenticated users to upload arbitrary files and manipulate file paths on the server. Vulnerable versions: WebCTRL i-Vu SiteScan Web 6.5 and prior, WebCTRL i-Vu 6.0 and prior, WebCTRL SiteScan Web 6.1 and prior. These products are used for centralized building automation control including HVAC, lighting, and energy management. An attacker with valid engineering credentials could exploit these weaknesses to execute arbitrary code on the automation server.
- Valid engineering credentials for WebCTRL
- Network access to WebCTRL web interface (typically port 80 or 443)
- JavaScript enabled in client browser (for UI interaction)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/96e9d311-d067-47cf-8a6c-97102fdf70fbGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.