PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-1341 Avation CVE debrief

CVE-2026-1341 is a critical weakness in Avation Light Engine Pro where the configuration and control interface is exposed without authentication or access control. CISA published the advisory on 2026-02-03 and assigned a CVSS v3.1 score of 9.8, reflecting the potential for remote, high-impact compromise of confidentiality, integrity, and availability.

Vendor
Avation
Product
Light Engine Pro
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-03
Original CVE updated
2026-02-03
Advisory published
2026-02-03
Advisory updated
2026-02-03

Who should care

OT/ICS operators using Avation Light Engine Pro, plant engineers, control-system administrators, and security teams responsible for network segmentation and exposure control around industrial devices.

Technical summary

The advisory states that Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control. The provided CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating network-reachable attack conditions with no privileges or user interaction required. CISA also notes that Avation had not responded to its coordination request at publication time.

Defensive priority

Immediate. Treat as a critical exposure on any reachable instance of Light Engine Pro and prioritize compensating controls if a vendor fix is not yet available.

Recommended defensive actions

  • Identify all Avation Light Engine Pro deployments and determine whether the configuration/control interface is reachable from any untrusted network.
  • Restrict access to the device or management interface using segmentation, allowlisting, VPNs, or dedicated management networks.
  • Follow CISA ICS recommended practices and defense-in-depth guidance to reduce exposure around industrial control assets.
  • Monitor for unauthorized configuration changes or unexpected control activity on affected systems.
  • Contact Avation for product-specific remediation guidance and updates, as CISA notes the vendor had not responded to its coordination request at publication time.

Evidence notes

All factual statements are drawn from the CISA CSAF advisory ICSA-26-034-02 and its embedded metadata: the interface is unauthenticated, the product is Avation Light Engine Pro, the advisory was first published on 2026-02-03, CVSS v3.1 is 9.8, and the vendor had not responded to CISA's coordination request. No public KEV listing or exploit campaign information is included in the supplied corpus.

Official resources

CISA published ICSA-26-034-02 for CVE-2026-1341 on 2026-02-03. The advisory states that Avation Light Engine Pro exposes its configuration and control interface without authentication or access control, and that Avation had not responded to