PatchSiren cyber security CVE debrief
CVE-2026-1301 o6 Automation GmbH CVE debrief
CISA’s CSAF advisory for Open62541 says that, in builds with PubSub and JSON enabled, a crafted JSON message can make the decoder write beyond a heap-allocated array before authentication. The result is a reliable process crash and memory corruption risk. CISA assigns CVSS v3.1 5.7 (MEDIUM) and recommends upgrading to stable release v1.5.0.
- Vendor
- o6 Automation GmbH
- Product
- Open62541
- CVSS
- MEDIUM 5.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-02-05
- Original CVE updated
- 2026-02-05
- Advisory published
- 2026-02-05
- Advisory updated
- 2026-02-05
Who should care
Organizations running Open62541 in OT/ICS environments, especially deployments with PubSub and JSON enabled; system integrators; platform maintainers; and incident responders supporting exposed or network-reachable installations.
Technical summary
The advisory describes a heap write beyond bounds in the JSON decoder path of Open62541 when PubSub and JSON are enabled. A crafted JSON message can trigger the issue before authentication, causing denial of service through process crash and creating a memory-corruption condition. The supplied CVSS vector is AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H, indicating network reachability with a required interaction condition and high availability impact.
Defensive priority
High for exposed or actively used deployments; Medium overall based on the published CVSS score.
Recommended defensive actions
- Upgrade Open62541 to the stable release of v1.5.0 as recommended by the vendor.
- Inventory deployments to identify systems built with PubSub and JSON enabled.
- Prioritize remediation for any deployment that can receive untrusted JSON over the network.
- Apply CISA ICS recommended practices and defense-in-depth controls to reduce exposure around affected services.
- Monitor affected environments for unexpected process crashes, decoder faults, or other memory-corruption symptoms.
Evidence notes
All substantive claims here come from the CISA CSAF advisory ICSA-26-036-03 and its linked CVE record for CVE-2026-1301. The advisory states the affected configuration (PubSub plus JSON enabled), the pre-authentication crafted JSON trigger, the crash/memory-corruption impact, the CVSS v3.1 vector, and the vendor remediation to upgrade to stable v1.5.0.
Official resources
-
CVE-2026-1301 CVE record
CVE.org
-
CVE-2026-1301 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2026-02-05 in advisory ICSA-26-036-03, with the source advisory initially published the same day. The remediation guidance in the advisory recommends upgrading to stable release v1.5.0.