Arbitrary Command Execution in mySCADA myPRO Software
CVE-2025-20014

9.3CRITICAL

Key Information:

Vendor
Myscada
Status
Mypro Manager
Mypro Runtime
Vendor
CVE Published:
29 January 2025

Badges

🔥 Trending now📈 Trended📈 Score: 6,760

What is CVE-2025-20014?

CVE-2025-20014 is a significant vulnerability identified in the mySCADA myPRO software, which is designed for industrial automation and control systems. This vulnerability arises from improper handling of POST requests that include version information, allowing attackers to execute arbitrary commands on the affected systems. Such a flaw could lead to severe operational disruptions and compromise the integrity of critical infrastructure managed by organizations using this software, potentially resulting in costly downtime and security incidents.

Technical Details

The vulnerability pertains specifically to how mySCADA myPRO processes certain POST requests sent to designated ports. The lack of adequate sanitization of input data allows an attacker to manipulate these requests, thereby executing commands that the system should not authorize. Such command execution can occur remotely, leveraging this oversight to gain unauthorized system access or influence system behavior.

Potential impact of CVE-2025-20014

  1. Unauthorized Access: Attackers can gain direct control over affected systems, allowing them to execute commands that could alter system operations or extract sensitive information.

  2. Operational Disruption: The ability to execute arbitrary commands can lead to severe disruptions in business processes, affecting productivity and potentially leading to downtime for critical industrial operations.

  3. Data Integrity Risks: Compromised control systems can manipulate data, leading to misinformation, potential safety hazards, and loss of trust in the system’s reliability. This may have far-reaching consequences for organizations in sectors such as manufacturing, energy, and transportation.

Affected Version(s)

myPRO Manager 0 < 1.3

myPRO Runtime 0 < 9.2.1

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mehmet INCE from PRODAFT.com working with Trend Micro Zero Day Initiative reported these vulnerabilities to CISA.
.