PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-32666 Automated Logic CVE debrief

CVE-2026-32666 is a high-severity integrity issue in Automated Logic WebCTRL Premium Server <v8.5. CISA reports that WebCTRL systems communicating over BACnet do not add validation beyond BACnet’s weak network-layer trust model, so an attacker with network access could spoof BACnet packets to the WebCTRL server or associated controllers and have them accepted as legitimate.

Vendor
Automated Logic
Product
WebCTRL Premium Server
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-19
Original CVE updated
2026-03-19
Advisory published
2026-03-19
Advisory updated
2026-03-19

Who should care

Building automation and OT teams running Automated Logic WebCTRL, especially environments that still rely on BACnet without BACnet Secure Connect (BACnet/SC). This is most relevant to facility operators, integrators, and defenders responsible for HVAC and building control networks, including systems running WebCTRL 7 (end of life) or older deployments that have not moved to supported secure configurations.

Technical summary

The issue is not a memory corruption bug in the advisory text provided; it is a protocol trust gap. BACnet lacks network-layer authentication, and WebCTRL does not apply additional validation to BACnet traffic, so spoofed packets sent by a network-accessible attacker may be processed by the WebCTRL server or controllers as if they were legitimate. The supplied CVSS vector reflects a network-reachable, low-complexity attack with high integrity impact and no confidentiality or availability impact stated.

Defensive priority

High for OT/building-automation networks that expose or route BACnet traffic. Prioritize if BACnet spans untrusted or broadly shared segments, if the deployment still uses unsupported WebCTRL versions, or if BACnet/SC is not enabled. The advisory’s risk is especially meaningful where spoofed control messages could affect building operations.

Recommended defensive actions

  • Upgrade to the latest supported WebCTRL release that supports BACnet/SC, per Automated Logic guidance.
  • Treat WebCTRL 7 as end of life; migrate off unsupported versions as soon as operationally feasible.
  • Use BACnet Secure Connect (BACnet/SC) where supported to add TLS encryption and mutual authentication.
  • Segment building automation networks and restrict which hosts can reach BACnet services.
  • Apply strict access control and limit administrative and engineering access to OT assets.
  • Follow CISA ICS recommended practices and defense-in-depth guidance for industrial control systems.

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-26-078-08 for CVE-2026-32666, published 2026-03-19. The advisory states that WebCTRL systems communicating over BACnet inherit the protocol’s lack of network-layer authentication and that WebCTRL does not add validation, allowing spoofed BACnet packets to be accepted as legitimate. The supplied data also indicates CVSS v3.1 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and an SSVC note of E:N/A:Y dated 2026-03-18. No KEV entry or ransomware campaign is indicated in the supplied corpus.

Official resources

Initial CISA CSAF publication date: 2026-03-19T06:00:00.000Z. The source record includes an SSVC timestamp of 2026-03-18T06:00:00.000Z, but the advisory publication date is the date used for this debrief. No KEV date was supplied.