PatchSiren cyber security CVE debrief
CVE-2026-6284 Horner Automation CVE debrief
CVE-2026-6284 is a critical authentication weakness affecting Horner Automation Cscape and XL4/XL7 PLC products. CISA says an attacker with network access to the PLC can brute-force passwords because of limited password complexity and the lack of password input limiters, which can lead to unauthorized access to systems and services. The published remediation is to update Cscape to v10.2 SP2 or later and install the latest firmware for the affected PLCs.
- Vendor
- Horner Automation
- Product
- Cscape
- CVSS
- CRITICAL 9.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-04-16
- Original CVE updated
- 2026-04-16
- Advisory published
- 2026-04-16
- Advisory updated
- 2026-04-16
Who should care
OT/ICS operators, PLC administrators, and engineering teams running Horner Automation Cscape v10.0, XL4 PLC v16.32.0, or XL7 PLC v15.60 should treat this as urgent, especially if PLC management or authentication services are reachable from the network.
Technical summary
The source advisory describes a network-reachable password enumeration/brute-force condition caused by limited password complexity and no password input limiters. The supplied CVSS vector is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N, indicating easy remote exploitation with high confidentiality and integrity impact and no availability impact in the scoring model.
Defensive priority
Immediate
Recommended defensive actions
- Update Horner Automation Cscape to v10.2 SP2 or later.
- Apply the latest firmware for both XL4 and XL7 PLCs.
- Restrict network access to affected PLC interfaces and management services to only trusted administrative sources.
- Use OT network segmentation and defense-in-depth controls to reduce exposure of PLC authentication surfaces.
- Review logs and alerting for repeated or suspicious authentication attempts.
- Consult Horner Automation release notes and CISA ICS recommended practices for deployment-specific guidance.
Evidence notes
This debrief is based on the supplied CISA CSAF advisory ICSA-26-106-02 and the official CVE record metadata in the corpus. The advisory text explicitly states that an attacker with network access can brute-force discover passwords because of limited password complexity and no password input limiters, and it lists vendor remediation to update Cscape and PLC firmware. Published and modified dates in the corpus are both 2026-04-16T06:00:00.000Z.
Official resources
-
CVE-2026-6284 CVE record
CVE.org
-
CVE-2026-6284 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA in advisory ICSA-26-106-02 on 2026-04-16, matching the CVE publication date in the supplied corpus.