Kunbus PR100088 Modbus Gateway (Update B)
The Kunbus PR100088 Modbus gateway contains multiple input validation and authentication bypass vulnerabilities (CWE-287, CWE-306, CWE-20, CWE-598, CWE-312) that allow remote code execution and denial-of-service. An attacker can send crafted Modbus TCP packets to the gateway without credentials or special setup to achieve these impacts. The gateway is typically deployed in industrial networks to bridge supervisory systems to field equipment over Modbus TCP. Kunbus states these devices are designed for protected industrial networks, not Internet-facing deployment. A patch is available for Version R03 or later.
- Network access to the PR100088 gateway (typically port 502 for Modbus TCP)
- Device is reachable from an untrusted network segment or the Internet
Patching may require device reboot — plan for process interruption
/api/v1/advisories/45c88224-51a7-4ba7-993f-f7719d098183Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.