First published: Wed Jan 29 2025(Updated: )
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
mySCADA myPRO Manager | <1.3 | 1.3 |
mySCADA myPRO Runtime | <9.2.1 | 9.2.1 |
mySCADA recommends updating to the latest versions: * mySCADA PRO Manager 1.3 https://www.myscada.org/resources/ * mySCADA PRO Runtime 9.2.1 https://www.myscada.org/resources/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20014 has been classified as a high severity vulnerability due to its potential to allow attackers to execute arbitrary commands.
To fix CVE-2025-20014, upgrade mySCADA myPRO Manager to version 1.3 or later and mySCADA myPRO Runtime to version 9.2.1 or later.
CVE-2025-20014 affects mySCADA myPRO Manager versions below 1.3 and mySCADA myPRO Runtime versions below 9.2.1.
Yes, CVE-2025-20014 can be exploited remotely through specifically crafted POST requests.
Exploiting CVE-2025-20014 could lead to unauthorized command execution, compromising system integrity and potentially resulting in a full system takeover.