APsystems Energy Communication Unit (ECU-C) Power Control Software
A missing authentication mechanism in APSystems Energy Communication Unit (ECU-C) Power Control Software allows an attacker with network access to the device to execute arbitrary administrative commands and access sensitive data without valid credentials. The vulnerability affects all tested versions (C1.2.2, v3.11.4, W2.1.NA, v4.1SAA, v4.1NA). APSystems has not provided a patch and has not engaged with CISA on remediation. The vulnerability is classified as high severity (CVSS 8.8) due to high confidentiality, integrity, and availability impact. No public exploitation has been reported.
- Network access to the ECU-C device (adjacent network or routed IP connectivity)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a07ba19a-8c14-48df-b2fa-451640e2b638Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.