of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed at either the WebCTRL server or associated
AutomatedLogic controllers. Spoofed packets may be processed as
legitimate.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Automated Logic notes that WebCTRL 7 is end of life and has been out of support since January 27, 2023. Users are advised to upgrade to the latest version of the WebCTRL server application, which supports the more secure BACnet/SC.
Workaround
No workaround given by the vendor.
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate. | |
| Title | Automated Logic WebCTRL Premium Server Authentication Bypass by Spoofing | |
| Weaknesses | CWE-290 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-03-20T23:17:29.342Z
Reserved: 2026-03-12T19:57:03.327Z
Link: CVE-2026-32666
No data.
Status : Received
Published: 2026-03-21T00:16:26.220
Modified: 2026-03-21T00:16:26.220
Link: CVE-2026-32666
No data.
OpenCVE Enrichment
No data.