VulnerabilitiesCRITICAL

Critical Flaw in InSAT MasterSCADA BUK-TS Exposes Remote Code Risks

CICISA Advisories19h ago2 min read
CVE-2026-21410CVE-2026-22553InSATMasterSCADA BUK-TSremote code execution
🎯

Basically, a serious flaw in a control system could let hackers take control remotely.

Quick Summary

A critical vulnerability in InSAT MasterSCADA BUK-TS could allow hackers to take control remotely. This affects critical infrastructure sectors worldwide, posing serious risks to public safety. Users are urged to take defensive measures immediately.

What Happened

A critical vulnerability has been discovered in the InSAT MasterSCADA BUK-TS, a system used for managing critical infrastructure. This flaw allows remote code execution, meaning attackers could potentially control systems from afar. The vulnerabilities are identified as CVE-2026-21410 and CVE-2026-22553, affecting all versions of the software.

The first vulnerability, CVE-2026-21410, involves SQL Injection, which occurs when malicious users exploit a weakness in the system's web interface. The second vulnerability, CVE-2026-22553, is related to OS Command Injection, allowing attackers to execute arbitrary commands on the operating system. Both vulnerabilities pose significant risks, especially considering the critical sectors this software supports, including energy and water management.

Why Should You Care

If you work in industries relying on InSAT MasterSCADA BUK-TS, this news is alarming. Imagine your bank account being accessed remotely by someone you don’t know. This is similar to what could happen with critical infrastructure if these vulnerabilities are exploited. Your safety and security could be at risk, not just personally but also for the community relying on these essential services.

Even if you’re not directly using this software, the implications are far-reaching. Critical infrastructure supports everything from your electricity supply to clean water. If hackers gain control, they could disrupt services that affect everyone. The stakes are high, and it’s crucial to stay informed about these vulnerabilities.

What's Being Done

Currently, InSAT has not responded to requests from CISA? to address these vulnerabilities. However, users of the affected software should take immediate action. Here are some steps to consider:

  • Minimize network exposure for control system devices to reduce the risk of exploitation.
  • Isolate control system networks from business networks and ensure they are behind firewalls?.
  • If remote access is necessary, use secure methods like VPNs, while being aware of their potential vulnerabilities.

Experts are closely monitoring this situation, particularly to see if InSAT will provide any patches or updates. The urgency of these vulnerabilities cannot be overstated, and organizations must act swiftly to protect their systems.

💡 Tap dotted terms for explanations

🔒 Pro insight: The lack of vendor response heightens the urgency for organizations to implement immediate defensive measures against these critical vulnerabilities.

Original article from

CISA Advisories · CISA

Read Full Article

Related Pings

HIGHVulnerabilities

HttpOnly Cookies at Risk from New 'Cookie Sandwich' Technique

A new technique called 'cookie sandwich' can steal secure cookies from websites. This affects users relying on HttpOnly flags for protection. Stay informed and ensure your online security measures are up to date.

PortSwigger Research·36m ago·2m
HIGHVulnerabilities

Exploitation Alert: Gladinet Vulnerability Targets Cryptography

A vulnerability in Gladinet's CentreStack and Triofox software is being actively exploited. Users are at risk of data breaches due to hardcoded cryptographic keys. Gladinet is working on a fix, but immediate action is needed to secure your systems.

Huntress Blog·37m ago·2m
HIGHVulnerabilities

XSS Vulnerability Found in RPi-Jukebox-RFID 2.8.0

A serious XSS vulnerability has been found in RPi-Jukebox-RFID 2.8.0. Users are at risk of attackers injecting harmful scripts. Update your software immediately to protect your device and data.

Exploit-DB·37m ago·2m
HIGHVulnerabilities

Hacked Construction Apps Threaten Jobsite Security

Hacked construction apps are exposing job sites to security risks. This affects contractors and workers alike, leading to potential project delays and safety issues. Stay updated on software patches and security measures to protect your projects.

Huntress Blog·37m ago·2m
HIGHVulnerabilities

URL Validation Bypass Cheat Sheet Gets Powerful New Payloads

A new update to the URL Validation Bypass Cheat Sheet introduces powerful payloads for web security experts. This matters because weak URL validations can lead to serious security breaches. Stay informed and protect your online activities!

PortSwigger Research·37m ago·2m
HIGHVulnerabilities

Windows 10 Faces Spoofing Vulnerability Risk

A spoofing vulnerability has been found in Windows 10 version 10.0.17763.7009. This flaw could allow attackers to impersonate legitimate users, risking your sensitive information. Microsoft is working on a patch, so stay alert and update your system when available.

Exploit-DB·37m ago·2m