Rapid Software LLC Rapid SCADA
Rapid SCADA versions 5.8.4 and earlier contain multiple critical vulnerabilities including path traversal (CWE-22, CWE-23), insecure permissions (CWE-732), hardcoded credentials (CWE-798), and credential exposure (CWE-209, CWE-256). These allow attackers to read arbitrary files from the server, write files to execute code, steal administrator credentials, and access sensitive application internals. Social engineering attacks can also compromise operator accounts via phishing. Rapid Software has not responded to CISA coordination and no vendor patch is available.
- Network access to RapidScada server port/interface
- No authentication required for some vulnerabilities (file read/write)
- Social engineering attacks require user interaction (clicking phishing links)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cc85ac83-ca5d-4544-8061-be7becb813ceGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.