CVE-2026-5387
Privilege Escalation in Simulator Software via Unauthorized Role Access
Publication date: 2026-04-15
Last updated on: 2026-04-15
Assigner: ICS-CERT
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aveva | pipeline_simulation | to 2025_sp1_p01 (exc) |
| aveva | pipeline_simulation | to 2025_sp1 (exc) |
| aveva | pipeline_simulation | From 2025_sp1_p01 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows an unauthenticated attacker to perform operations that should only be accessible to Simulator Instructor or Simulator Developer (Administrator) roles.
Exploitation of this vulnerability results in privilege escalation, enabling the attacker to modify simulation parameters, training configurations, and training records.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves missing authorization on certain API methods of AVEVA Pipeline Simulation 2025 SP1 and earlier versions, allowing unauthenticated privilege escalation. Detection would involve monitoring or testing access to these API methods to see if unauthorized operations can be performed.
While no specific detection commands are provided, recommended defensive measures include restricting network access to the Pipeline Simulation Server API using host-based or network firewalls to allow connections only from trusted clients, and enforcing TLS for all API communications to prevent unauthorized access and tampering.
For practical detection, one might attempt to access the API endpoints without authentication to verify if unauthorized operations are possible, but exact commands or scripts are not detailed in the provided resources.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an unauthenticated attacker to escalate privileges and modify sensitive simulation parameters, training configurations, and records. Such unauthorized access and modification could potentially lead to non-compliance with standards and regulations that require strict access controls and data integrity, such as GDPR and HIPAA.
While the provided information does not explicitly mention specific impacts on compliance with GDPR, HIPAA, or other regulations, the nature of the vulnerability—unauthorized privilege escalation and modification of sensitive data—implies risks related to confidentiality, integrity, and accountability that are central to these standards.
Mitigation recommendations include upgrading to a patched version, restricting network access, and enforcing secure communications, which align with best practices for maintaining compliance with security requirements in common standards.
What immediate steps should I take to mitigate this vulnerability?
To mitigate CVE-2026-5387, AVEVA recommends upgrading to AVEVA Pipeline Simulation 2025 SP1 P01 (build 7.1.9580.8513) or later.
- Restrict network access to the Pipeline Simulation Server API using host-based or network firewalls to allow connections only from trusted client systems.
- Enforce secure communication by enabling TLS for all API communications with proper server certificate management to prevent man-in-the-middle attacks and data tampering.
Consult AVEVA Customer Support and AVEVA Security Central for further assistance and updates.
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized privilege escalation, which can lead to unauthorized changes in simulation parameters, training configurations, and training records.
Such unauthorized modifications could compromise the integrity and reliability of training simulations and records, potentially affecting training outcomes and operational readiness.