Kaleris Navis N4 Terminal Operating System
Navis N4 Terminal Operating System versions before 4.0 contain unsafe deserialization and cleartext data transmission vulnerabilities in the Ultra Light Client component. Successful exploitation allows remote code execution and sensitive data extraction without authentication. The vulnerabilities affect the web-based Ultra Light Client interface used for terminal operations access. Kaleris has released patched versions for all supported release lines (3.1.44, 3.2.26, 3.3.27, 3.4.25, 3.5.18, 3.6.14, 3.7.0, 3.8.0, and 4.0), with version 4.0 replacing the vulnerable Ultra Light Client entirely with an HTML UI.
- Network reachability to the Navis N4 web interface or Ultra Light Client endpoint
- N4 version before 4.0 with Ultra Light Client enabled
- No prior authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/13333387-65ad-4e5e-b380-04d6d034ea39Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.