PiiGAB M-Bus
PiiGAB M-Bus SoftwarePack 900S contains multiple critical vulnerabilities including command injection (CWE-94), weak password storage (CWE-798, CWE-256), insufficient authentication (CWE-307), Cross-Site Request Forgery (CWE-352), and weak cryptographic key management (CWE-523, CWE-916). These flaws allow remote attackers with no authentication to inject arbitrary commands, steal credentials, and trick users into executing malicious commands. The vulnerabilities are exploitable over the network with low attack complexity. PiiGAB has released updated software available through the gateway web UI and their website (Piigab.se or Piigab.com).
- Network access to the M-Bus gateway on the Internet or local network
- No authentication required for some vulnerabilities
- Gateway running vulnerable 900S software version
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b009fb1c-4ea7-4d00-8de3-f747e0eb3cdfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.