PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-8527 Automated Logic CVE debrief

CVE-2024-8527 is a critical open redirect issue in Automated Logic WebCTRL and related product lines. According to the CISA advisory published on 2025-11-20, the affected software could accept a user-supplied URL and redirect users without proper validation, creating risk for phishing, trust abuse, and security-control bypass. Automated Logic states the issue is remediated in Web CTRL 9.0, while several older releases are out of support.

Vendor
Automated Logic
Product
Carrier i-Vu
CVSS
CRITICAL 9.3
CISA KEV
Not listed in stored evidence
Original CVE published
2025-11-20
Original CVE updated
2025-11-20
Advisory published
2025-11-20
Advisory updated
2025-11-20

Who should care

Building automation system administrators, security teams, and operators using Automated Logic WebCTRL Server, Carrier i-Vu, Automated Logic SiteScan Web, or Automated Logic WebCTRL for OEMs. Organizations with internet-facing login pages, user workflows that generate redirects, or environments that rely on users recognizing trusted URLs should prioritize review.

Technical summary

The advisory describes an open redirect condition: the application accepts a user-supplied URL and redirects to it without adequate validation. In practice, this can let an attacker steer a user from a legitimate Automated Logic page to a malicious destination. The advisory lists affected product families including Automated Logic WebCTRL Server, Carrier i-Vu, Automated Logic SiteScan Web, and Automated Logic WebCTRL for OEMs. Automated Logic reports remediation in Web CTRL 9.0, and notes Web CTRL 7.0, Web CTRL 6.1, and i-Vu 6.0 are out of support.

Defensive priority

Critical

Recommended defensive actions

  • Upgrade to the latest available version; Automated Logic reports the issue is remediated in Web CTRL 9.0.
  • Inventory deployments of WebCTRL Server, Carrier i-Vu, SiteScan Web, and WebCTRL for OEMs to determine exposure.
  • Treat older out-of-support releases such as Web CTRL 7.0, Web CTRL 6.1, and i-Vu 6.0 as urgent upgrade candidates or isolate them where immediate replacement is not possible.
  • Review application flows that issue redirects and validate that any redirect target is allowlisted or otherwise strictly controlled.
  • Apply CISA and Automated Logic building-automation security best practices, including phishing awareness and defense-in-depth guidance referenced in the advisory.

Evidence notes

This debrief is based on the CISA CSAF advisory source item for ICSA-25-324-01 and its embedded metadata, which explicitly describe the weakness as improper validation of a user-supplied URL used for redirects. The source also states that Automated Logic remediated the issue in Web CTRL 9.0 and that Web CTRL 7.0, Web CTRL 6.1, and i-Vu 6.0 are out of support. Timing context uses the supplied CVE and source publication date of 2025-11-20; no exploit-in-the-wild claim is made because none is present in the source corpus.

Official resources

CISA published the advisory on 2025-11-20, and the source metadata shows an initial publication revision on that date. This entry reflects the supplied CVE and source timeline only; no additional disclosure timing is inferred.