The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new mandate for federal agencies to secure their industrial control systems following evidence of active exploitation in the wild. The agency has officially added CVE-2021-26829, a vulnerability in OpenPLC ScadaBR, to its Known Exploited Vulnerabilities (KEV) Catalog.
This inclusion signals that threat actors are actively weaponizing this specific flaw to target operational technology (OT) environments.
The vulnerability, tracked as CVE-2021-26829, is a Stored Cross-Site Scripting (XSS) flaw affecting OpenPLC ScadaBR versions up to 0.9.1 on Linux and 1.12.4 on Windows.
Unlike reflected XSS attacks that require a user to click a malicious link, Stored XSS is particularly insidious in administrative interfaces. The flaw exists within the system_settings.shtm component. Attackers can inject malicious scripts that are permanently stored on the server. When an administrator or operator views the affected settings page, the malicious script executes automatically in their browser.
In the context of a SCADA (Supervisory Control and Data Acquisition) system, this could allow attackers to hijack administrator sessions, manipulate industrial processes, or pivot further into sensitive OT networks.
The vulnerability is well-documented in the security community. Security researcher Fellipe Oliveira has notably published a video demonstration on YouTube, detailing exactly how to exploit this flaw. This public availability of exploit methodology likely lowers the barrier to entry for less sophisticated threat actors, increasing the urgency for remediation.
Recognizing the “significant risks to the federal enterprise,” CISA has set a strict deadline for compliance. Federal Civilian Executive Branch (FCEB) agencies are required to remediate this identified flaw by December 19, 2025.
While the mandate legally applies to federal agencies, CISA strongly urges all organizations—especially those managing critical infrastructure—to prioritize patching this vulnerability immediately to prevent potential disruption of industrial control operations.
Related Posts:
- Ransomhub’s SCADA Hack: A Wake-Up Call for Industrial Cybersecurity
- Flaws Found in Hitachi Energy’s MicroSCADA X SYS600: CVEs Could Enable File Tampering, DoS, and MITM Attacks
- German is investigating a cyberattack against federal ministries, Russian group suspected