Successful exploitation of this vulnerability could allow an attacker to enumerate the functionality of each component associated with the PLC, reconfigure, rename, delete, perform file transfers, and make remote procedure calls.
The following versions of Contemporary Controls BASC 20T are affected:
BASControl20 3.1 (CVE-2025-13926)
Vendor
Equipment
Contemporary Controls Sedona Alliance
Contemporary Controls BASC 20T
Reliance on Untrusted Inputs in a Security Decision
Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy
Countries/Areas Deployed: Worldwide
Company Headquarters Location: United States
An attacker could use data obtained by sniffing the network traffic to forge packets in order to make arbitrary requests to Contemporary Controls BASC 20T.
Contemporary Controls BASC 20T
MitigationAccording to Contemporary Controls, the BASC-2...