All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-055-01.json | Third Party Advisory |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-01 | US Government Resource VDB Entry |
Configurations
History
27 Feb 2026, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Insat
Insat masterscada |
|
| CPE | cpe:2.3:a:insat:masterscada:*:*:*:*:*:*:*:* | |
| References | () https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-055-01.json - Third Party Advisory | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-055-01 - US Government Resource, VDB Entry |
24 Feb 2026, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 21:16
Updated : 2026-02-27 03:15
NVD link : CVE-2026-22553
Mitre link : CVE-2026-22553
CVE.ORG link : CVE-2026-22553
JSON object : View
Products Affected
insat
- masterscada
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
