Econolite EOS (Update A)
Econolite EOS versions prior to 3.2.23 contain inadequate access controls (CWE-284, CWE-328) that allow unauthenticated remote attackers to gain full administrative control over the traffic management system. The vulnerability enables manipulation of system settings, traffic signal timing, and operational parameters without any credentials or user interaction. EOS is a centralized traffic signal control and management platform used to coordinate traffic signals across municipalities and transportation networks.
- Network connectivity to the EOS system on its service port
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/68ded622-817f-4c1b-9bed-9411adf339dbGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.