Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Avatar
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems. “These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially
[[{“value”:”

Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational technology (OT) environments, that could allow malicious actors to take control of susceptible systems.

“These vulnerabilities, if exploited, could grant unauthorized access to industrial control networks, potentially leading to severe operational disruptions and financial losses,” Swiss security company PRODAFT said.

The list of shortcomings, both rated 9.3 on the CVSS v4 scoring system, are below –

CVE-2025-20014 – An operating system command injection vulnerability that could permit an attacker to execute arbitrary commands on the affected system via specially crafted POST requests containing a version parameter
CVE-2025-20061 – An operating system command injection vulnerability that could permit an attacker to execute arbitrary commands on the affected system via specially crafted POST requests containing an email parameter

Successful exploitation of either of the two flaws could permit an attacker to inject system commands and execute arbitrary code.

According to PRODAFT, both vulnerabilities stem from a failure to sanitize user inputs, thereby opening the door to a command injection.

“These vulnerabilities highlight the persistent security risks in SCADA systems and the need for stronger defenses,” the company said. “Exploitation could lead to operational disruptions, financial losses, and safety hazards.”

Organizations are recommended to apply the latest patches, enforce network segmentation by isolating SCADA systems from IT networks, enforce strong authentication, and monitor for suspicious activity.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

“}]] The Hacker News 

Total
0
Shares
Previous Post

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

Next Post

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

Related Posts

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent
Avatar
Read More

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection

A new variant of the Snake Keylogger malware is being used to actively target Windows users located in China, Turkey, Indonesia, Taiwan, and Spain. Fortinet FortiGuard Labs said the new version of the malware has been behind over 280 million blocked infection attempts worldwide since the start of the year. "Typically delivered through phishing emails containing malicious attachments or links,
Avatar
Read More