SDG PnPSCADA
A SQL injection vulnerability in PnPSCADA v2.x allows an attacker to interact with and retrieve critical data from the underlying database. The vulnerability can be exploited remotely without authentication. The affected versions are in the v2.* line (v2.x). SDG PnPSCADA is developing a fix; users should contact support@pnpscada.com for updates. Workarounds include using prepared statements, avoiding public exposure of SCADA systems, and implementing network segmentation to isolate systems from the internet.
- Network reachability to the PnPSCADA application interface (typically HTTP/HTTPS)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9c57933f-3000-44a2-b5d3-d7402a9d80e1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.