Haas Controller
The Haas Controller (firmware version 100.20.000.1110) contains multiple vulnerabilities in the Ethernet Q Commands service that allow unauthenticated remote code execution. The service does not require authentication for command submission, does not encrypt communications, and does not properly validate or restrict commands. These weaknesses allow an attacker to remotely execute arbitrary commands on the controller, causing denial-of-service, tool damage, quality defects, or complete loss of machine control. The vulnerabilities stem from missing authentication (CWE-306), weak credential handling (CWE-1220), and unencrypted communications (CWE-319).
- Network access to the Haas Controller (usually internal network or Internet-exposed)
- No credentials required
- Ethernet Q Commands service must be enabled and reachable
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5d3f887b-4a47-43fb-8f4f-2703fe5f3c91Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.