Cyber Posture

CVE-2026-25293

Critical

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 9.6 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0002 5.7th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Buffer overflow due to incorrect authorization in PLC FW

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-863

Periodic review and update of procedures reduces incorrect authorization implementations over time.

addresses: CWE-863

Supervision identifies cases where authorization logic incorrectly permits unauthorized actions.

addresses: CWE-863

Defining permitted attribute values and auditing modifications reduces the chance of incorrect authorization outcomes due to tampered or missing labels.

addresses: CWE-863

The authorization process and usage restrictions help prevent incorrect authorization for remote access types.

addresses: CWE-863

Establishing configuration and connection requirements helps ensure correct rather than incorrect authorization for wireless access.

addresses: CWE-863

Establishing connection authorization processes for mobile devices helps ensure authorization decisions are correctly implemented rather than incorrect.

addresses: CWE-863

Monitoring account use, notifying on changes, and reviewing accounts for compliance corrects incorrect authorization assignments.

addresses: CWE-863

Ensures authorization decisions for external system use are correctly implemented and enforced.

Security SummaryAI

CVE-2026-25293 is a buffer overflow vulnerability caused by incorrect authorization, mapped to CWE-863, affecting PLC firmware. Published on 2026-05-04, it carries a CVSS v3.1 base score of 9.6, indicating critical severity.

An unauthenticated attacker on an adjacent network can exploit the vulnerability with low attack complexity and no user interaction required. Exploitation grants high impacts across confidentiality, integrity, and availability, with a changed scope that enables severe compromise such as arbitrary code execution on the affected PLC firmware.

Qualcomm's May 2026 security bulletin, available at https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2026-bulletin.html, details mitigation strategies and available patches for addressing this issue.

Details

CWE(s)

References