OTPulse

Daikin Europe N.V Security Gateway

Act Now9.8ICS-CERT ICSA-25-254-10Sep 11, 2025
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

The Daikin Security Gateway (App:_100_Frm:_214) contains an authorization bypass vulnerability (CWE-640) that allows an attacker without credentials to gain unauthorized access to the system. Successful exploitation could permit an attacker to access and control the gateway and any connected systems. Daikin Europe N.V has stated they will not fix this vulnerability and will handle inquiries on a case-by-case basis.

What this means
What could happen
An attacker with network access to the Security Gateway could gain unauthorized system access and potentially control HVAC operations, building automation, or connected industrial processes depending on what the gateway manages in your facility.
Who's at risk
Building automation operators, HVAC technicians, and facilities managers relying on Daikin Security Gateway (App:_100_Frm:_214) for remote monitoring and control of climate and energy management systems should prioritize this vulnerability. Also relevant to any industrial process relying on this gateway for connectivity.
How it could be exploited
An attacker on the network (or internet if the gateway is exposed) connects directly to the Security Gateway without needing credentials. By exploiting the authorization bypass vulnerability, the attacker gains administrative access to the device and can issue commands to any connected systems.
Prerequisites
  • Network access to the Security Gateway (port and protocol unknown; assume reachable from business network or internet if misconfigured)
  • No authentication required
remotely exploitableno authentication requiredlow complexityno patch availablevendor will not fix
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
Security Gateway: App:_100_Frm:_214App: 100 Frm: 214No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2
WORKAROUNDImmediately restrict network access to the Security Gateway by placing it behind a firewall and blocking inbound connections from untrusted networks and the internet
WORKAROUNDContact Daikin customer support to determine if any undocumented mitigations, configuration changes, or interim firmware updates are available
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGIf remote access to the gateway is required, implement a VPN with strong authentication and encryption; ensure the VPN software is kept up to date
Mitigations - no patch available
0/1
Security Gateway: App:_100_Frm:_214 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGIsolate the Security Gateway and any systems it controls onto a separate network segment from business systems and the internet
↑↓ Navigate · Esc Close
API: /api/v1/advisories/12e0048b-48aa-4314-b635-d6012c857892