PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-4293 Kieback & Peter CVE debrief

CVE-2026-4293 is a CVSS 5.3 medium-severity cross-site scripting issue affecting Kieback & Peter DDC building controllers. The published description says attacker-controlled JavaScript can execute in the victim’s browser, which can give the attacker control over that browser context. The NVD record was published on 2026-05-20 and was still marked "Awaiting Analysis" in the supplied source snapshot, so defenders should treat exposure as a web-interface security issue with potential session and UI manipulation impact.

Vendor
Kieback & Peter
Product
DDC4002
CVSS
MEDIUM 5.3
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-20
Advisory published
2026-05-20
Advisory updated
2026-05-20

Who should care

Operators and security teams responsible for Kieback & Peter DDC building controllers, especially environments exposing controller web interfaces to trusted-user networks or remote administration paths. Browser-based operator consoles, engineering workstations, and any account that accesses controller UIs should be considered in scope.

Technical summary

The source corpus identifies the weakness as CWE-79 (cross-site scripting) with CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. That combination indicates a network-reachable issue that can affect integrity through script execution in the browser, without requiring privileges or user interaction per the vector. The supplied description does not specify the exact XSS variant, affected versions, or a vendor fix status, so the safe assumption is that any web UI or embedded management interface in the affected controller line may be reachable through a maliciously crafted request or content path.

Defensive priority

Medium. Prioritize if the controllers are accessible from business networks, remote access tooling, or shared operator browsers, because successful XSS can alter what an operator sees or does in the management interface.

Recommended defensive actions

  • Confirm whether any Kieback & Peter DDC building controllers in your environment are exposed through web management interfaces.
  • Restrict access to controller administrative interfaces to dedicated management networks and trusted administrative hosts.
  • Apply vendor or integrator guidance as soon as an affected-version/fix matrix is available from the official advisory path referenced by NVD.
  • Review browser security controls for operator workstations, including least-privilege browser use and separation between admin browsing and general web browsing.
  • Monitor logs for unusual parameter values, malformed input, or unexpected script-bearing content targeting controller web pages.
  • If compensating controls are needed, place the management interface behind authentication, network segmentation, and a reverse proxy or access gateway with strict filtering where operationally supported.

Evidence notes

This debrief is based only on the supplied NVD record and the referenced CISA/CSAF advisory links. The CVE description explicitly states cross-site scripting affecting Kieback & Peter DDC building controllers. The supplied metadata lists CWE-79 and the CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. No KEV entry, exploitation status, affected version list, or remediation details were provided in the corpus.

Official resources

Publicly disclosed on 2026-05-20. In the supplied source snapshot, NVD status is "Awaiting Analysis" and no Known Exploited Vulnerabilities (KEV) entry is indicated.