Sploit.io - Search

Product: M-Bus SoftwarePack, version: 900S

CVE-2023-31277

Severity: HIGH

Description: PiiGAB M-Bus transmits credentials in plaintext format.

CVSS Score: 7.5

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.000960000
  • Percentile: 0.265560000
  • Date: 2026-04-20

ExploitDB

No data available.

HackerOne Data

  • Rank: 9122
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • PiiGAB M-Bus SoftwarePack - Versions: 900S

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2023-31277 concerns the PiiGAB M-Bus software transmitting credentials in plaintext. This poses a significant risk because any attacker able to intercept network traffic can easily capture usernames and passwords. The CVSS score of 7.5 (HIGH) indicates a substantial risk level. The vulnerability is easily exploitable, with a low attack complexity and requiring no privileges or user interaction. The primary impact is on confidentiality – attackers can gain access to potentially sensitive credentials used for M-Bus communication. Integrity and availability are currently unaffected, but compromised credentials could lead to broader impacts down the line. The business impact can range from unauthorized access to M-Bus data to potential control system compromise, depending on the role and permissions associated with the compromised credentials. This is particularly relevant in industrial control systems (ICS) where M-Bus is commonly used for metering and monitoring.

    2. Potential Attack Scenarios
    An attacker positioned on the same network segment as the PiiGAB M-Bus gateway can leverage a simple network sniffing tool like Wireshark to capture the plaintext credentials during a typical authentication process. The attacker initiates a communication with the M-Bus gateway, which responds by sending its credentials in plaintext. The attacker intercepts this traffic, obtains the username and password, and can then use these credentials to authenticate to the M-Bus gateway, potentially gaining access to all associated M-Bus devices and their data. This could allow the attacker to manipulate metering data, change configuration settings, or even disrupt the overall system operation depending on the privileges associated with the credentials. The ease of exploitation is high as the attack requires only basic network monitoring capabilities, readily available to a wide range of attackers.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2023-31277 is to update the PiiGAB M-Bus SoftwarePack 900S to the latest version. PiiGAB has released updated software to address this issue, available for download directly from the web UI within the gateway or from their website at http://www.piigab.se/ or https://www.piigab.com/. In addition to patching, the following measures should be taken:
    Implement the principle of least privilege, ensuring that M-Bus credentials have only the necessary permissions for their intended function.
    Set strong, unique passwords for all M-Bus devices and the gateway itself.
    Minimize network exposure by locating the M-Bus network behind a firewall and isolating it from business networks.
    Employ secure remote access methods, such as VPNs, when necessary.
    Regularly monitor network traffic for unusual activity to detect potential credential compromise.
    CISA provides additional guidance for ICS vulnerabilities at https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01

    4. Executive Summary
    CVE-2023-31277 represents a HIGH risk vulnerability in the PiiGAB M-Bus software, where credentials are transmitted in plaintext. This means attackers on the network can easily intercept usernames and passwords, potentially gaining unauthorized access to M-Bus devices and data. The impact could range from compromised metering data to potential disruption of control system operations. The vulnerability is easily exploitable and requires a relatively simple attack. To mitigate this risk, organizations using PiiGAB M-Bus SoftwarePack 900S should immediately update to the latest version. Implementing strong passwords, limiting network exposure, and employing secure remote access methods will further enhance security. Prompt action is crucial to protect valuable data and maintain the integrity of M-Bus controlled systems.

    CVE-2023-32652

    Severity: HIGH

    Description: PiiGAB M-Bus does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.

    CVSS Score: 8

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.001130000
    • Percentile: 0.296700000
    • Date: 2026-04-24

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9163
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • PiiGAB M-Bus SoftwarePack - Versions: 900S

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, CVE-2023-32652, is a cross-site scripting (XSS) vulnerability present in the PiiGAB M-Bus software, specifically version 900S. The root cause is a failure to properly validate identification strings before processing them, opening the door for malicious scripts to be injected and executed. This is considered a HIGH risk vulnerability, with a CVSS score of 8.0, indicating a significant threat. The likelihood of exploitation is moderate, requiring user interaction, but the ease of exploitation is relatively low once the user interaction occurs. The potential impact is high across all three areas of confidentiality, integrity, and availability. Successful exploitation could lead to the compromise of sensitive data, modification of system settings, and potentially denial of service. Considering the M-Bus software is used in industrial control systems (ICS), the potential business impact could range from process disruptions and data breaches to control system manipulation, potentially impacting production or safety.

      2. Potential Attack Scenarios
      A potential attack scenario involves a malicious actor crafting a specially crafted M-Bus message containing a malicious JavaScript payload embedded within an identification string. This message is then sent to a system running the vulnerable PiiGAB M-Bus software. A user interacting with the M-Bus interface (e.g., via a web-based dashboard) then triggers the execution of the malicious script when the identification string is processed. The script could steal session cookies, redirect the user to a phishing site, or even modify system settings controlled by the M-Bus interface. For example, in a water treatment plant, a compromised M-Bus interface could allow an attacker to subtly alter chemical dosing levels, impacting water quality. The attack vector is network-based, making it accessible from within the ICS network, or potentially even remotely if the M-Bus interface is exposed to a wider network.

      3. Mitigation Recommendations
      The primary mitigation for CVE-2023-32652 is to upgrade to the latest version of the PiiGAB M-Bus software, which includes the fix for the XSS vulnerability. PiiGAB has released updated software packages available for download directly from the web UI within the gateway or from their website at http://www.piigab.se/ or https://www.piigab.com/. In addition to patching, implement the following defensive measures: enforce the principle of least privilege for user accounts accessing the M-Bus interface, ensuring users only have the necessary permissions. Implement strong password policies and multi-factor authentication where possible. Minimize network exposure of the M-Bus system, isolating it behind firewalls and restricting access from untrusted networks. Regularly monitor M-Bus traffic for anomalous activity. CISA also recommends ensuring systems are not accessible from the internet: https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01.

      4. Executive Summary
      CVE-2023-32652 is a HIGH risk cross-site scripting vulnerability affecting PiiGAB M-Bus software version 900S. This vulnerability could allow attackers to inject malicious scripts and compromise the M-Bus system, potentially impacting data confidentiality, integrity, and availability. Because PiiGAB M-Bus is often utilized in critical infrastructure environments, successful exploitation could lead to disruptions in industrial processes and potentially even impact safety. We recommend immediately patching the M-Bus software to the latest version. Additionally, implement strong authentication practices and network segmentation to minimize the risk of exploitation. Addressing this vulnerability is crucial to maintain the security and reliability of systems utilizing the PiiGAB M-Bus. Prompt action is recommended to mitigate the risk and ensure continued operational efficiency.

      CVE-2023-33868

      Severity: MEDIUM

      Description: The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.

      CVSS Score: 5.9

      Priority

      D

      CISA Data

      EPSS Data

      • EPSS: 0.000620000
      • Percentile: 0.192480000
      • Date: 2026-04-25

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9178
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • PiiGAB M-Bus SoftwarePack - Versions: 900S

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability CVE-2023-33868 centers around a lack of limitation on login attempts for HTTP Basic Authentication within the PiiGAB M-Bus SoftwarePack 900S. This allows an attacker to perform a brute-force attack against the system. The base CVSS score of 5.9 (Medium) indicates a moderate risk. The vulnerability’s network attack vector and high attack complexity suggest exploitation isn't trivial, but is achievable. The primary impact is on confidentiality; successful brute-forcing can grant an attacker access to sensitive information protected by HTTP Basic Authentication. Integrity and availability are currently considered to have minimal impact, but could be affected if the compromised account has write access or impacts system performance. Given the increasing prevalence of brute-force attacks, and the potential for high confidentiality impact, this vulnerability poses a moderate risk to organizations utilizing the affected PiiGAB software.

        2. Potential Attack Scenarios
        An attacker, leveraging a network connection, can target the PiiGAB M-Bus SoftwarePack 900S. The attacker initiates a brute-force attack against a user account utilizing HTTP Basic Authentication. The attacker utilizes a tool like Hydra or Burp Suite to systematically attempt different username and password combinations. Because there's no rate limiting, the attacker can attempt numerous combinations without being locked out. If the target account has a weak or commonly used password, the attacker will eventually succeed in authenticating and gaining access to the system with the privileges associated with that account. This access could lead to the exfiltration of configuration data, metering information, or other sensitive data handled by the M-Bus gateway.

        3. Mitigation Recommendations
        The primary mitigation is to upgrade to the latest version of the PiiGAB M-Bus SoftwarePack, which addresses the lack of login attempt limitation. The updated software packages can be downloaded directly from the web UI in the gateway, or from Piigab.se (http://www.piigab.se/) or Piigab.com (https://www.piigab.com/). In addition to patching, consider implementing these best practices: enforce strong, unique passwords for all user accounts utilizing HTTP Basic Authentication. Minimize network exposure of the M-Bus gateway, ideally placing it behind a firewall and restricting access from the internet. Implement a least-privilege model, granting users only the necessary access rights. Consider migrating to a more secure authentication method than HTTP Basic Authentication, if feasible.

        4. Executive Summary
        CVE-2023-33868 is a medium-severity vulnerability affecting the PiiGAB M-Bus SoftwarePack 900S. The vulnerability allows attackers to potentially gain unauthorized access to the system through brute-forcing HTTP Basic Authentication due to a lack of login attempt limitation. A successful attack could lead to the compromise of sensitive data managed by the M-Bus gateway. While the attack requires some effort, the potential impact on data confidentiality warrants prompt action. We recommend upgrading to the latest version of the software as soon as possible. Implementing strong passwords and limiting network exposure are also important steps to mitigate the risk and protect critical infrastructure data. Addressing this vulnerability is crucial for maintaining the security and integrity of M-Bus communication.

        CVE-2023-34433

        Severity: HIGH

        Description: PiiGAB M-Bus stores passwords using a weak hash algorithm.

        CVSS Score: 7.5

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.000610000
        • Percentile: 0.187810000
        • Date: 2026-04-30

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 9227
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • PiiGAB M-Bus SoftwarePack - Versions: 900S

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability CVE-2023-34433 concerns the use of a weak hash algorithm for password storage within the PiiGAB M-Bus SoftwarePack 900S. This allows an attacker, with moderate effort, to potentially crack stored passwords and gain unauthorized access to systems utilizing M-Bus communication. The CVSS score of 7.5 (HIGH) indicates a significant risk. The vulnerability’s impact is primarily on confidentiality, as compromised passwords allow access to potentially sensitive data transmitted over the M-Bus. Integrity and availability are less directly impacted, although a compromised system could be leveraged to disrupt M-Bus communications. The likelihood of exploitation is moderate, as the M-Bus is often used in industrial control systems (ICS) and building automation, environments where security practices may sometimes be less stringent than traditional IT environments. Ease of exploitation is relatively low, requiring access to the stored password hashes, but modern cracking tools can efficiently break weak hashes. The business impact could range from data breaches and operational disruption to potential physical impacts depending on the function of the M-Bus controlled devices.

          2. Potential Attack Scenarios
          An attacker targeting a building automation system utilizing the PiiGAB M-Bus could leverage CVE-2023-34433 in the following scenario: The attacker gains network access to the M-Bus gateway (900S) through a direct connection or via a connected network. They then extract the password hashes from the gateway’s storage. Using a common password cracking tool (e.g., Hashcat, John the Ripper) and a dictionary or brute-force attack, the attacker cracks the passwords. These cracked passwords grant the attacker access to the M-Bus gateway's configuration and potentially control of connected devices such as meters, valves, or sensors. The attacker could then manipulate these devices, potentially causing incorrect readings, disrupting operations (e.g., turning off heating or cooling), or even causing physical damage depending on the connected devices and the system’s configuration.

          3. Mitigation Recommendations
          The primary mitigation is to update the PiiGAB M-Bus SoftwarePack 900S to the latest version which implements a stronger hashing algorithm. Download the updated software packages directly from the web UI in the gateway or from Piigab.se (http://www.piigab.se/) or Piigab.com (https://www.piigab.com/). In addition to patching, implement the following best practices: enforce strong and unique passwords for all M-Bus connected systems. Limit network exposure of the M-Bus gateway, ensuring it is not directly accessible from the Internet. Segment the control system network from the business network using firewalls. Implement least privilege access control, granting users only the necessary permissions. Regularly monitor M-Bus traffic for anomalous activity. Consider implementing multi-factor authentication where supported by the gateway.

          4. Executive Summary
          CVE-2023-34433 represents a HIGH risk vulnerability in the PiiGAB M-Bus SoftwarePack 900S, stemming from the use of a weak password hashing algorithm. This allows attackers to potentially crack passwords and gain unauthorized access to systems controlling critical infrastructure and building automation processes. A successful attack could lead to data breaches, operational disruptions, and even physical impacts depending on the connected devices. The most effective mitigation is to update to the latest version of the SoftwarePack. Additional security measures like strong passwords, network segmentation, and access control will further reduce the risk. Addressing this vulnerability is crucial to maintaining the integrity and availability of systems relying on the PiiGAB M-Bus, protecting both operational efficiency and potentially physical assets. Prompt patching and implementation of recommended security practices are vital.

          CVE-2023-34995

          Severity: HIGH

          Description: There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.

          CVSS Score: 7.5

          Priority

          B

          CISA Data

          EPSS Data

          • EPSS: 0.001150000
          • Percentile: 0.298210000
          • Date: 2026-04-30

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 9228
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • PiiGAB M-Bus SoftwarePack - Versions: 900S

            References:

            Risk Assessment

            1. Risk Assessment
            The vulnerability, CVE-2023-34995, stems from weak password requirements in the PiiGAB M-Bus software, specifically version 900S. The lack of complexity requirements for passwords makes the system susceptible to brute-force attacks. The base CVSS score of 7.5 (HIGH) indicates a significant risk. The vulnerability primarily impacts confidentiality, as a successful brute-force attack could grant an attacker access to data transmitted or managed by the M-Bus system. Integrity and availability are currently considered less impacted, though a compromised system could potentially lead to data manipulation or denial-of-service in more complex attacks. The likelihood of exploitation is moderate to high, especially in environments where commonly used passwords or predictable passwords are utilized. Ease of exploitation is considered relatively easy, as brute-force attacks are well-established and can be automated. Business impact depends on the sensitivity of the data flowing through the M-Bus system. If the M-Bus system monitors and controls critical infrastructure, a successful attack could lead to operational disruptions or even safety concerns.

            2. Potential Attack Scenarios
            A potential attack scenario involves a malicious actor targeting a PiiGAB M-Bus system connected to a smart building's heating and cooling system. The attacker utilizes a network-based brute-force attack, leveraging common password lists and dictionaries, to gain access to the M-Bus gateway. The attack vector is network access to the M-Bus gateway. The attacker initiates the brute-force attack using a tool like Hydra or Medusa, targeting the M-Bus gateway’s administrative login. Given the lack of password complexity requirements, the attacker successfully cracks the password within a reasonable timeframe. Once authenticated, the attacker gains access to the M-Bus system, enabling them to monitor data readings, potentially manipulate temperature settings, or even disrupt the entire heating and cooling system, leading to discomfort for building occupants and potential energy waste.

            3. Mitigation Recommendations
            The primary mitigation is to upgrade the PiiGAB M-Bus software to the latest version, which includes improved password requirements. PiiGAB has released updated software packages downloadable directly from the web UI in the gateway or from their website at http://www.piigab.se/ or https://www.piigab.com/. In the interim, organizations should enforce strong password policies for all M-Bus user accounts, encouraging the use of a mix of upper and lowercase letters, numbers, and special characters. Implement account lockout policies to limit the number of failed login attempts, hindering brute-force attacks. Minimize network exposure by placing the M-Bus system behind a firewall and restricting network access to authorized personnel. Regularly monitor M-Bus system logs for suspicious login activity. Consider using multi-factor authentication (MFA) where supported for an additional layer of security.

            4. Executive Summary
            PiiGAB M-Bus software version 900S is vulnerable to brute-force attacks due to weak password requirements. This vulnerability, with a high severity score of 7.5, could allow attackers to gain access to data monitored and controlled by the M-Bus system. A successful attack could compromise confidentiality, and potentially impact operations. The recommended action is to immediately upgrade to the latest version of the PiiGAB M-Bus software. In addition, organizations should enforce strong password policies and monitor their M-Bus systems for suspicious activity. Addressing this vulnerability is important to protect sensitive data and ensure the reliable operation of systems relying on the PiiGAB M-Bus. Prompt action will minimize the risk of disruption and data compromise.

            CVE-2023-35120

            Severity: HIGH

            Description: PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.

            CVSS Score: 8.8

            Priority

            B

            CISA Data

            EPSS Data

            • EPSS: 0.000840000
            • Percentile: 0.244180000
            • Date: 2026-04-15

            ExploitDB

            No data available.

            HackerOne Data

            • Rank: 9102
            • Reports submitted count: 0
            • Unknown: 0
            • None: 0
            • Low: 0
            • Medium: 0
            • High: 0
            • Critical: 0

            GitHub PoCs

              Nuclei Templates

              No data available.

              VulnCheck Data

              Affected Products:

              • PiiGAB M-Bus SoftwarePack - Versions: 900S

              References:

              Risk Assessment

              1. Risk Assessment
              The PiiGAB M-Bus software, specifically version 900S, is vulnerable to a cross-site request forgery (CSRF) attack. This vulnerability allows an attacker to trick an authenticated user into executing unwanted commands on the M-Bus device. The nature of the vulnerability stems from insufficient validation of the origin of requests, enabling an attacker to leverage a user’s existing session. The business impact can range from minor configuration changes to significant operational disruptions, depending on the privileges of the compromised user and the function of the M-Bus device within the larger system. The likelihood of exploitation is moderate, requiring a successful phishing component, but the ease of exploitation, once the user clicks the malicious link, is high. The vulnerability impacts confidentiality, integrity, and availability – an attacker could potentially read sensitive data, modify device configurations, and even cause denial of service. The CVSS score of 8.8 (HIGH) reflects the significant potential impact and relative ease of exploitation. The EPSS score of 0.000840000 suggests a relatively low, but not negligible, probability of exploitation in the wild.

              2. Potential Attack Scenarios
              An attacker crafts a phishing email targeting a user with an active session on the PiiGAB M-Bus device. The email contains a link designed to trigger a GET or POST request to the M-Bus device. This link is carefully constructed to perform an action, such as changing a critical configuration parameter or initiating a specific command. The user, believing the link is legitimate, clicks on it while logged in to the M-Bus device. The browser, automatically including the user’s cookie for authentication, sends the request to the M-Bus device, executing the attacker’s command as if it were initiated by the authenticated user. Potential outcomes include modification of device settings, alteration of data collection parameters, or even a disruption of communication with connected meters, depending on the specific command embedded within the malicious link.

              3. Mitigation Recommendations
              The primary mitigation for this vulnerability is to upgrade the PiiGAB M-Bus SoftwarePack to the latest version, which addresses the CSRF issue. The updated software packages can be downloaded directly from the web UI in the gateway or from Piigab.se (http://www.piigab.se/) or Piigab.com (https://www.piigab.com/). In addition to patching, implement these defensive measures: enforce the principle of least privilege, granting users only the necessary permissions to perform their tasks. Implement strong and unique passwords for all user accounts. Minimize network exposure of the M-Bus device, limiting access from untrusted networks, and ideally, keeping it behind a firewall. Educate users about phishing attacks, emphasizing the importance of carefully examining links before clicking. Consider implementing CSRF tokens or other CSRF protection mechanisms at the application level if possible. Refer to CISA advisory ICSA-23-187-01 (https://www.cisa.gov/news-events/ics-advisories/icsa-23-187-01) for more detailed guidance.

              4. Executive Summary
              The PiiGAB M-Bus software is susceptible to a cross-site request forgery (CSRF) vulnerability, rated HIGH severity. This means a malicious actor can potentially control the M-Bus device by tricking an authenticated user into clicking a specially crafted link, often delivered via phishing email. This could lead to changes in device configuration, data manipulation, or even service disruption. It’s critical to update the M-Bus software to the latest version to resolve this vulnerability. Furthermore, user education regarding phishing attacks and adherence to security best practices like strong passwords and network segmentation will significantly reduce the risk. Addressing this vulnerability is important to ensure the reliable operation of the M-Bus system and protect against potential disruptions to data collection and control processes. Prompt action is recommended to minimize the potential business impact.

              CVE-2023-35765

              Severity: MEDIUM

              Description: PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.

              CVSS Score: 6.5

              Priority

              B

              CISA Data

              EPSS Data

              • EPSS: 0.000770000
              • Percentile: 0.230100000
              • Date: 2026-04-15

              ExploitDB

              No data available.

              HackerOne Data

              • Rank: 9103
              • Reports submitted count: 0
              • Unknown: 0
              • None: 0
              • Low: 0
              • Medium: 0
              • High: 0
              • Critical: 0

              GitHub PoCs

                Nuclei Templates

                No data available.

                VulnCheck Data

                Affected Products:

                • PiiGAB M-Bus SoftwarePack - Versions: 900S

                References:

                Risk Assessment

                1. Risk Assessment
                The vulnerability CVE-2023-35765 centers around PiiGAB M-Bus software storing credentials in a plaintext file. This represents a moderate risk, scoring 6.5 on the CVSS scale. The nature of the vulnerability is that a low-level user, with limited privileges, could potentially gain access to administrative credentials. The likelihood of exploitation is considered moderate, as it requires a user with some level of access to the system. The ease of exploitation is relatively low, as it relies on accessing a file on the system, but doesn't necessarily require complex technical skills. The primary impact is on confidentiality, as admin credentials could be compromised. Integrity and availability are less directly impacted, although a compromised admin account could lead to changes or disruptions. Business impact could range from unauthorized access to M-Bus data and control, to potential disruption of industrial processes, depending on the specific deployment of the M-Bus system.

                2. Potential Attack Scenarios
                A potential attack scenario involves a disgruntled or compromised low-level user with access to the M-Bus system. The attacker gains access to the server or system where the M-Bus software is installed. They then locate the plaintext file containing the credentials, potentially using standard file system navigation tools. Once the admin credentials are obtained, the attacker can log in as an administrator, potentially gaining full control of the M-Bus system. This control could be used to monitor data, alter configurations, or even disrupt operations, depending on the role of the M-Bus system within the broader industrial environment. The outcome could be unauthorized data exfiltration, subtle process manipulation, or even a complete shutdown of the monitored/controlled system.

                3. Mitigation Recommendations
                The primary mitigation recommendation is to apply the updated software released by PiiGAB. The updated software addresses the plaintext credential storage issue. Download the new software packages directly from the web UI in the gateway or from Piigab.se http://www.piigab.se/ or Piigab.com https://www.piigab.com/. As an immediate workaround, organizations should enforce the principle of least privilege, ensuring users only have the necessary access to perform their duties. Unique and strong passwords should be set for all accounts requiring authentication. Minimize network exposure of the M-Bus system and ensure it's not directly accessible from the internet. Locate the control system network behind firewalls and utilize secure remote access methods like VPNs. Regularly review access logs for anomalous activity.

                4. Executive Summary
                CVE-2023-35765 is a vulnerability in PiiGAB M-Bus software that allows low-level users to potentially access administrator credentials due to plaintext storage. This poses a moderate risk to the confidentiality of the system and could lead to unauthorized access or disruption of industrial processes. The key to resolving this vulnerability is to upgrade to the latest version of the M-Bus software provided by PiiGAB. Implementing the principle of least privilege and using strong passwords are also important steps. Addressing this vulnerability is critical to maintaining the security and reliability of systems using PiiGAB M-Bus, reducing the risk of data compromise and operational disruption. Prompt action is recommended to minimize potential business impact.

                CVE-2023-35987

                Severity: CRITICAL

                Description: PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.

                CVSS Score: 9.8

                Priority

                B

                CISA Data

                EPSS Data

                • EPSS: 0.001100000
                • Percentile: 0.293200000
                • Date: 2026-04-15

                ExploitDB

                No data available.

                HackerOne Data

                • Rank: 9104
                • Reports submitted count: 0
                • Unknown: 0
                • None: 0
                • Low: 0
                • Medium: 0
                • High: 0
                • Critical: 0

                GitHub PoCs

                  Nuclei Templates

                  No data available.

                  VulnCheck Data

                  Affected Products:

                  • PiiGAB M-Bus SoftwarePack - Versions: 900S

                  References:

                  Risk Assessment

                  1. Risk Assessment
                  The vulnerability CVE-2023-35987 impacts PiiGAB M-Bus software, specifically version 900S, due to the presence of hard-coded credentials used for authentication. This is a critical vulnerability, indicated by a CVSS score of 9.8, signifying a high likelihood of exploitation and significant impact. The nature of hard-coded credentials means an attacker doesn't need to crack or brute-force passwords; they already know them. This vulnerability poses a substantial risk to confidentiality, integrity, and availability. An attacker gaining access could potentially read sensitive data, modify configurations, or even disrupt operations. The business impact could range from data breaches and operational downtime to financial losses and reputational damage, particularly in industrial control systems (ICS) environments where M-Bus is commonly deployed. The likelihood of exploitation is high due to the simplicity of the attack vector – no complex preconditions are necessary. The ease of exploitation is also high, as it requires minimal technical skill.

                  2. Potential Attack Scenarios
                  An attacker targeting a PiiGAB M-Bus gateway could exploit this vulnerability through a network-based attack. Assuming the M-Bus gateway is accessible via the network (potentially even through the internet if not properly segmented), the attacker can initiate a connection and authenticate using the hard-coded credentials. Once authenticated, the attacker gains full control over the M-Bus gateway. This allows them to monitor all M-Bus traffic, potentially extracting sensitive data such as energy consumption readings, meter data, or control commands. Further, the attacker could modify configurations, potentially disrupting communication with connected meters or devices. A more sophisticated attack could involve injecting malicious M-Bus commands, leading to incorrect readings, faulty control actions, or even equipment damage. The attack vector is network-based, making it easily scalable and potentially allowing for widespread compromise if multiple M-Bus gateways are affected.

                  3. Mitigation Recommendations
                  The primary mitigation is to upgrade to the latest version of the PiiGAB M-Bus SoftwarePack, as PiiGAB has released updated software to address these issues. The new software packages can be downloaded directly from the web UI in the gateway or from http://www.piigab.se/ or https://www.piigab.com/. In addition to patching, implement the following: Ensure the least-privilege user principle is followed wherever possible, even if using the hard-coded credentials temporarily. Set unique and strong passwords for all other products requiring authentication within the environment. Minimize network exposure for all control system devices and/or systems, ideally ensuring they are not directly accessible from the Internet. Locate control system networks behind firewalls and isolate them from business networks. When remote access is required, use secure methods like VPNs, ensuring they are updated to the latest versions. Regularly monitor M-Bus traffic for unusual activity.

                  4. Executive Summary
                  CVE-2023-35987 represents a critical vulnerability in PiiGAB M-Bus software due to hard-coded credentials. This allows attackers to easily gain full control of M-Bus gateways, potentially compromising sensitive data, disrupting operations, and causing financial or reputational damage. The vulnerability is easily exploitable and poses a significant risk, particularly in industrial control systems environments. The most effective mitigation is to immediately upgrade to the latest version of the PiiGAB M-Bus SoftwarePack. Additional security measures, such as network segmentation and strong password practices, can further reduce the risk. Addressing this vulnerability is crucial to protecting critical infrastructure and ensuring business continuity. Prompt action is recommended to minimize the potential impact of a successful attack.

                  CVE-2023-36859

                  Severity: HIGH

                  Description: PiiGAB M-Bus SoftwarePack 900S does not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.

                  CVSS Score: 8.8

                  Priority

                  B

                  CISA Data

                  EPSS Data

                  • EPSS: 0.001290000
                  • Percentile: 0.323640000
                  • Date: 2026-04-12

                  ExploitDB

                  No data available.

                  HackerOne Data

                  • Rank: 9070
                  • Reports submitted count: 0
                  • Unknown: 0
                  • None: 0
                  • Low: 0
                  • Medium: 0
                  • High: 0
                  • Critical: 0

                  GitHub PoCs

                  No data available.

                  Nuclei Templates

                  No data available.

                  VulnCheck Data

                  Affected Products:

                  • PiiGAB M-Bus SoftwarePack - Versions: 900S

                  References:

                  Risk Assessment

                  1. Risk Assessment
                  The PiiGAB M-Bus SoftwarePack 900S vulnerability, identified as CVE-2023-36859, represents a significant risk due to its potential for code injection. The vulnerability stems from inadequate sanitization of user input, allowing an attacker to inject and execute arbitrary commands. With a CVSS score of 8.8 (HIGH), the risk is substantial. The likelihood of exploitation is moderate to high, given the network accessibility (Attack Vector: Network) and low privilege requirement for a successful attack (Privileges Required: Low). The impact is high across all three core security tenets: Confidentiality, Integrity, and Availability. Successful exploitation could lead to data breaches, manipulation of system configurations, and even denial of service, potentially disrupting operations reliant on the M-Bus system. This is particularly concerning for industrial control systems (ICS) environments where the M-Bus is frequently used for meter reading and control, as compromised data or control signals can have real-world consequences. The EPSS score of 0.001290000 indicates a relatively low, but not negligible, probability of exploitation in the wild, given the prevalence of the vulnerable software.

                  2. Potential Attack Scenarios
                  An attacker could leverage this vulnerability in a scenario involving a compromised M-Bus gateway. The attack vector would be network-based, exploiting the gateway’s connectivity. The attacker could send a specially crafted M-Bus message containing malicious commands embedded within a seemingly normal data field. Because the software doesn't properly sanitize the input, the injected commands would be executed by the gateway’s operating system. This could allow the attacker to gain shell access to the gateway, enabling them to steal configuration data, modify settings, or disrupt communication with connected meters. For example, an attacker could inject a command to read sensitive configuration files containing network credentials, allowing them to pivot into other network segments. Alternatively, they could inject a command to stop or alter meter readings, leading to inaccurate billing or process control. The potential outcome is a compromised M-Bus infrastructure impacting data accuracy, process control, and potentially leading to financial losses or operational disruptions.

                  3. Mitigation Recommendations
                  The primary mitigation is to update the PiiGAB M-Bus SoftwarePack 900S to the latest version. PiiGAB has released updated software to address the code injection vulnerability, downloadable directly from the web UI of the gateway or from their websites: http://www.piigab.se/ or https://www.piigab.com/. In addition to patching, the following defensive measures should be implemented: adhere to the principle of least privilege, ensuring users and processes have only the necessary permissions; enforce strong and unique passwords for all components requiring authentication; minimize network exposure of the control system devices, ideally isolating them from the internet and business networks; and when remote access is required, utilize secure methods like VPNs, ensuring the VPN itself is up-to-date. CISA recommends these general defensive measures to minimize the risk of exploitation, specifically focusing on minimizing network exposure and using secure remote access methods.

                  4. Executive Summary
                  CVE-2023-36859 represents a high-risk code injection vulnerability in the PiiGAB M-Bus SoftwarePack 900S. This vulnerability allows attackers to potentially take control of M-Bus gateways, leading to data breaches, disrupted operations, and potentially inaccurate meter readings. The impact is high, affecting the confidentiality, integrity, and availability of the M-Bus system. The most effective mitigation is to apply the updated software provided by PiiGAB. Prompt patching, coupled with implementing strong password policies, minimizing network exposure, and using secure remote access, will significantly reduce the risk of exploitation. Addressing this vulnerability is crucial for maintaining the reliability and security of M-Bus-based systems, particularly within industrial control environments where accurate data and reliable control are paramount. The potential business impacts range from financial losses due to inaccurate billing to operational disruptions and potentially even safety concerns. Therefore, swift action is recommended.