CVE-2026-0936

5.0 MEDIUM

📋 TL;DR

An authenticated local attacker can exploit this vulnerability in B&R PVI client versions prior to 6.5 to gather credential information from log files. The vulnerability only affects systems where logging has been explicitly enabled by the user, as it's disabled by default.

💻 Affected Systems

Products:
  • B&R PVI Client
Versions: All versions prior to 6.5
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when logging functionality is explicitly enabled by the user. Default configuration has logging disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker with local access could extract sensitive credentials from log files, potentially leading to privilege escalation or lateral movement within the network.

🟠

Likely Case

An authenticated user with local access could read credential information from improperly secured log files, compromising the security of the affected system.

🟢

If Mitigated

With logging disabled (default configuration) and proper access controls, the vulnerability presents minimal risk.

🌐 Internet-Facing: LOW - This requires local authenticated access, making internet-facing exploitation unlikely.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this if logging is enabled and they have access to log files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated local access and logging to be enabled. The attacker would need to locate and read the log files containing sensitive information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.5 or later

Vendor Advisory: https://www.br-automation.com/fileadmin/SA26P001-2862434c.pdf

Restart Required: Yes

Instructions:

1. Download PVI client version 6.5 or later from B&R Automation website. 2. Install the updated version following vendor instructions. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Disable Logging

windows

Disable the logging functionality in PVI client to prevent sensitive information from being written to log files.

Configure PVI client settings to disable logging functionality

Restrict Log File Access

windows

Apply strict file permissions to log directories to prevent unauthorized access.

icacls "C:\ProgramData\BR\PVI\Logs" /deny Users:(R,W,X)
icacls "C:\ProgramData\BR\PVI\Logs" /grant Administrators:(F)

🧯 If You Can't Patch

  • Ensure logging functionality remains disabled in PVI client configuration.
  • Implement strict access controls on log directories and files to prevent unauthorized reading.

🔍 How to Verify

Check if Vulnerable:

Check PVI client version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\BR\PVI\Version. If version is below 6.5 and logging is enabled, system is vulnerable.

Check Version:

reg query "HKLM\SOFTWARE\BR\PVI" /v Version

Verify Fix Applied:

Verify PVI client version is 6.5 or higher and check that logging is either disabled or properly secured.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to PVI log files
  • Suspicious reads of log files containing credential patterns

Network Indicators:

  • Local file access patterns to PVI log directories

SIEM Query:

EventID=4663 AND ObjectName LIKE '%PVI%Logs%' AND AccessMask=0x1

🔗 References

📤 Share & Export