Iagona ScrutisWeb
Iagona ScrutisWeb versions 2.1.37 and earlier contain vulnerabilities in file upload handling (CWE-434), path traversal (CWE-36), missing cryptographic protections (CWE-321), and improper access control (CWE-639). These weaknesses allow an unauthenticated attacker on the network to upload and execute arbitrary files on the ScrutisWeb server, leading to complete system compromise and potential control of connected industrial processes. The CVSS v3.0 score is 10.0 (critical) with a network attack vector, no authentication required, and no user interaction needed.
- Network access to the ScrutisWeb application
- ScrutisWeb version 2.1.37 or earlier
- Application must be reachable from the attacker's network (internet-facing increases risk)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/fde24372-07c4-42cd-8377-4eea0ef20b54Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.