CVE-2026-21410

9.8 CRITICAL

📋 TL;DR

CVE-2026-21410 is a SQL injection vulnerability in SAT MasterSCADA BUK-TS web interface that allows attackers to execute arbitrary SQL commands. Successful exploitation could lead to remote code execution on affected systems. Industrial control system operators using vulnerable versions are at risk.

💻 Affected Systems

Products:
  • SAT MasterSCADA BUK-TS
Versions: All versions prior to patch
Operating Systems: Windows-based SCADA systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the main web interface component of the SCADA system.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, manipulate industrial processes, steal sensitive data, and pivot to other network segments.

🟠

Likely Case

Data exfiltration, system manipulation, and potential disruption of industrial operations through SQL injection leading to RCE.

🟢

If Mitigated

Limited impact with proper network segmentation, input validation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities typically have low exploitation complexity, especially when unauthenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-01

Restart Required: Yes

Instructions:

1. Review vendor advisory at provided URL. 2. Download and apply vendor-provided patch. 3. Restart affected SCADA systems. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SCADA systems from untrusted networks and implement strict firewall rules

Web Application Firewall

all

Deploy WAF with SQL injection protection rules

🧯 If You Can't Patch

  • Implement strict network segmentation and zero-trust architecture
  • Deploy intrusion detection systems with SQL injection signatures

🔍 How to Verify

Check if Vulnerable:

Check system version against vendor advisory and test web interface for SQL injection vulnerabilities

Check Version:

Check SCADA system administration interface for version information

Verify Fix Applied:

Verify patch version installation and test web interface with SQL injection test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in application logs
  • Multiple failed login attempts with SQL syntax
  • Unexpected database connection attempts

Network Indicators:

  • SQL injection patterns in HTTP requests to SCADA web interface
  • Unusual outbound connections from SCADA system

SIEM Query:

source="scada_web_logs" AND (http_request CONTAINS "UNION" OR http_request CONTAINS "SELECT" OR http_request CONTAINS "INSERT" OR http_request CONTAINS "DELETE")

🔗 References

📤 Share & Export