Description
This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the security of the entire system.
Problem types
Product status
All versions
Credits
Khaled Sarieddine and Mohammad Ali Sayed reported these vulnerabilities to CISA
References
www.cisa.gov/news-events/ics-advisories/icsa-26-022-08
github.com/...p/csaf_files/OT/white/2026/icsa-26-022-08.json