Browse all 11 CVE security advisories affecting Automated Logic. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Automated Logic develops building automation systems for HVAC, energy management, and environmental controls. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and authentication weaknesses. The company has addressed multiple CVEs, including critical RCE vulnerabilities in their web interfaces and communication protocols. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities in their web-based control systems highlights ongoing challenges in securing IoT infrastructure. Their systems typically require network segmentation and regular patching to mitigate risks posed by these common vulnerability classes.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-0658 | Automated Logic and Carrier Zone Controllers malformed packets denial of service — Zone ControllersCWE-20 | 7.5 | - | 2025-11-27 |
This page lists every published CVE security advisory associated with Automated Logic. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.