CVE-2026-5387
Received Received - Intake
Privilege Escalation in Simulator Software via Unauthorized Role Access

Publication date: 2026-04-15

Last updated on: 2026-04-15

Assigner: ICS-CERT

Description
The vulnerability, if exploited, could allow an unauthenticated miscreant to perform operations intended only for Simulator Instructor or Simulator Developer (Administrator) roles, resulting in privilege escalation with potential for modification of simulation parameters, training configuration, and training records.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-15
Last Modified
2026-04-15
Generated
2026-05-06
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
aveva pipeline_simulation to 2025_sp1_p01 (exc)
aveva pipeline_simulation to 2025_sp1 (exc)
aveva pipeline_simulation From 2025_sp1_p01 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows an unauthenticated attacker to perform operations that should only be accessible to Simulator Instructor or Simulator Developer (Administrator) roles.

Exploitation of this vulnerability results in privilege escalation, enabling the attacker to modify simulation parameters, training configurations, and training records.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability involves missing authorization on certain API methods of AVEVA Pipeline Simulation 2025 SP1 and earlier versions, allowing unauthenticated privilege escalation. Detection would involve monitoring or testing access to these API methods to see if unauthorized operations can be performed.

While no specific detection commands are provided, recommended defensive measures include restricting network access to the Pipeline Simulation Server API using host-based or network firewalls to allow connections only from trusted clients, and enforcing TLS for all API communications to prevent unauthorized access and tampering.

For practical detection, one might attempt to access the API endpoints without authentication to verify if unauthorized operations are possible, but exact commands or scripts are not detailed in the provided resources.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an unauthenticated attacker to escalate privileges and modify sensitive simulation parameters, training configurations, and records. Such unauthorized access and modification could potentially lead to non-compliance with standards and regulations that require strict access controls and data integrity, such as GDPR and HIPAA.

While the provided information does not explicitly mention specific impacts on compliance with GDPR, HIPAA, or other regulations, the nature of the vulnerability—unauthorized privilege escalation and modification of sensitive data—implies risks related to confidentiality, integrity, and accountability that are central to these standards.

Mitigation recommendations include upgrading to a patched version, restricting network access, and enforcing secure communications, which align with best practices for maintaining compliance with security requirements in common standards.


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2026-5387, AVEVA recommends upgrading to AVEVA Pipeline Simulation 2025 SP1 P01 (build 7.1.9580.8513) or later.

  • Restrict network access to the Pipeline Simulation Server API using host-based or network firewalls to allow connections only from trusted client systems.
  • Enforce secure communication by enabling TLS for all API communications with proper server certificate management to prevent man-in-the-middle attacks and data tampering.

Consult AVEVA Customer Support and AVEVA Security Central for further assistance and updates.


How can this vulnerability impact me? :

The impact of this vulnerability includes unauthorized privilege escalation, which can lead to unauthorized changes in simulation parameters, training configurations, and training records.

Such unauthorized modifications could compromise the integrity and reliability of training simulations and records, potentially affecting training outcomes and operational readiness.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart