Leviton AcquiSuite and Energy Monitoring Hub
The vulnerability is a Stored Cross-Site Scripting (XSS) flaw in the web interface of Leviton AcquiSuite (A8810) and Energy Monitoring Hub (A8812) devices. An attacker can craft a malicious URL with JavaScript code embedded in parameters that executes when a user accesses the affected device's web interface. Successful exploitation allows the attacker to steal the user's session token and assume authenticated control of the energy monitoring system. Leviton has not engaged with CISA on mitigation and no patch is available.
- User must click a malicious link or visit a crafted URL
- User must be authenticated to the AcquiSuite or Energy Monitoring Hub web interface
- The device must be reachable from the network where the user is located
- No special credentials or configuration required beyond normal user access
Patching may require device reboot — plan for process interruption
/api/v1/advisories/92ea21b9-2f55-40f8-8fcc-d06262f64f94Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.