Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks

CISA Warns of OpenPLC ScadaBR File Upload Vulnerability Exploited in Attacks

Posted on December 4, 2025December 4, 2025 By CWS

Important vulnerability has been added to CISA’s Identified Exploited Vulnerabilities checklist, warning organizations a few harmful file-upload flaw in OpenPLC ScadaBR methods.

The vulnerability permits distant authenticated customers to add and execute arbitrary JSP information by way of the view_edit.shtm interface, creating a major threat for industrial management system environments.

OpenPLC ScadaBR File Add Vulnerability

OpenPLC ScadaBR, a web-based industrial automation platform, comprises an unrestricted file add vulnerability categorized beneath CWE-434 (Unrestricted Add of File with Harmful Sort).

This weak spot allows authenticated attackers to bypass safety controls and inject malicious code straight into susceptible methods.

The flexibility to add and execute JSP information gives attackers with persistent entry and the power to execute code throughout the industrial surroundings.

FieldDetailsCVE IDCVE-2021-26828Vulnerability TypeUnrestricted Add of File with Harmful TypeAffected ProductOpenPLC ScadaBRAttack VectorNetwork-based, RemoteCVSS SeverityCriticalImpactRemote Code Execution (RCE) by way of JSP file add

Doubtlessly disrupting crucial operations or facilitating lateral motion inside industrial networks.

Organizations should handle this vulnerability by December 24, 2025, in accordance with CISA’s deadline. Federal businesses and demanding infrastructure operators ought to prioritize instant remediation.

CISA recommends three main programs of motion: first, apply vendor-supplied mitigations in accordance with producer directions.

Second, for cloud-based deployments, comply with the steerage outlined in Binding Operational Directive (BOD 22-01). Third, discontinue use of OpenPLC ScadaBR if sufficient mitigations stay unavailable.

Whereas CISA has not confirmed this vulnerability’s use in lively ransomware campaigns, the character of the flaw makes it notably engaging to menace actors concentrating on industrial management methods.

File add vulnerabilities in industrial automation platforms signify a direct path to system compromise.

Particularly in environments the place safety monitoring could also be restricted. The three-week remediation window underscores the severity of the menace panorama.

Organizations working OpenPLC ScadaBR ought to instantly stock affected methods and validate their present patch standing.

Safety groups ought to implement community segmentation to restrict entry to administrative interfaces. Prohibit file uploads by way of firewall guidelines the place attainable, and improve monitoring for suspicious JSP file uploads.

Moreover, organizations ought to overview entry logs for proof of exploitation and coordinate with their industrial automation distributors to substantiate patch availability and deployment procedures.

This CISA alert highlights the continued dangers in industrial management methods. It underscores the significance of sustaining present patch administration practices in operational environments.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, CISA, Exploited, File, OpenPLC, ScadaBR, Upload, Vulnerability, Warns

Post navigation

Previous Post: Agentic Security Firm 7AI Raises $130 Million
Next Post: New SVG Clickjacking Attack Let Attackers Create Interactive Clickjacking Attacks

Related Posts

Claude AI Enhances Microsoft Word with New Beta Integration Claude AI Enhances Microsoft Word with New Beta Integration Cyber Security News
Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Cyber Security News
TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands TOTOLINK X6000R Router Vulnerabilities Let Remote Attackers Execute Arbitrary Commands Cyber Security News
What Is Out-of-Bounds Read and Write Vulnerability? What Is Out-of-Bounds Read and Write Vulnerability? Cyber Security News
Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Arizona Woman Sentenced for Helping North Korean IT Workers by Operating Laptop Farm Cyber Security News
New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities New eSIM Hack Let Attackers Clone Profiles and Hijack Phone Identities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark