First published: Wed Jan 29 2025(Updated: )
mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
mySCADA myPRO Manager | <1.3 | 1.3 |
mySCADA myPRO Runtime | <9.2.1 | 9.2.1 |
mySCADA recommends updating to the latest versions: * mySCADA PRO Manager 1.3 https://www.myscada.org/resources/ * mySCADA PRO Runtime 9.2.1 https://www.myscada.org/resources/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-20061 is considered a significant vulnerability as it allows attackers to execute arbitrary commands on vulnerable systems.
To fix CVE-2025-20061, update mySCADA myPRO Manager to version 1.3 or mySCADA myPRO Runtime to version 9.2.1 or higher.
The affected systems include mySCADA myPRO Manager versions below 1.3 and mySCADA myPRO Runtime versions below 9.2.1.
Yes, CVE-2025-20061 can potentially be exploited remotely through crafted POST requests.
CVE-2025-20061 can allow attackers to execute arbitrary commands, potentially leading to unauthorized system control.