myscada CVE Vulnerabilities & Metrics

Focus on myscada vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About myscada Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with myscada. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total myscada CVEs: 26
Earliest CVE date: 06 Oct 2017, 04:29 UTC
Latest CVE date: 13 Feb 2025, 22:15 UTC

Latest CVE reference: CVE-2025-25067

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -60.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -60.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical myscada CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.66

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 9
7.0-8.9 7
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS myscada CVEs

These are the five CVEs with the highest CVSS scores for myscada, sorted by severity first and recency.

All CVEs for myscada

CVE-2025-25067 myscada vulnerability CVSS: 0 13 Feb 2025, 22:15 UTC

mySCADA myPRO Manager is vulnerable to an OS command injection which could allow a remote attacker to execute arbitrary OS commands.

CVE-2024-4708 myscada vulnerability CVSS: 0 02 Jul 2024, 23:15 UTC

mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.

CVE-2023-29169 myscada vulnerability CVSS: 0 27 Apr 2023, 23:15 UTC

mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.

CVE-2023-29150 myscada vulnerability CVSS: 0 27 Apr 2023, 23:15 UTC

mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.

CVE-2023-28716 myscada vulnerability CVSS: 0 27 Apr 2023, 23:15 UTC

mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.

CVE-2023-28400 myscada vulnerability CVSS: 0 27 Apr 2023, 23:15 UTC

mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.

CVE-2023-28384 myscada vulnerability CVSS: 0 27 Apr 2023, 23:15 UTC

mySCADA myPRO versions 8.26.0 and prior has parameters which an authenticated user could exploit to inject arbitrary operating system commands.

CVE-2022-2234 myscada vulnerability CVSS: 0 24 Aug 2022, 16:15 UTC

An authenticated mySCADA myPRO 8.26.0 user may be able to modify parameters to run commands directly in the operating system.

CVE-2021-33013 myscada vulnerability CVSS: 5.0 13 May 2022, 16:15 UTC

mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive system information.

CVE-2021-33009 myscada vulnerability CVSS: 5.0 13 May 2022, 16:15 UTC

mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to the file system.

CVE-2021-33005 myscada vulnerability CVSS: 5.0 13 May 2022, 16:15 UTC

mySCADA myPRO versions prior to 8.20.0 allows an unauthenticated remote attacker to upload arbitrary files to arbitrary directories.

CVE-2021-27505 myscada vulnerability CVSS: 5.0 13 May 2022, 16:15 UTC

mySCADA myPRO versions prior to 8.20.0 does not restrict unauthorized read access to sensitive directory listing information.

CVE-2022-0999 myscada vulnerability CVSS: 9.0 11 Apr 2022, 20:15 UTC

An authenticated user may be able to misuse parameters to inject arbitrary operating system commands into mySCADA myPRO versions 8.25.0 and prior.

CVE-2021-44453 myscada vulnerability CVSS: 10.0 23 Dec 2021, 20:15 UTC

mySCADA myPRO: Versions 8.20.0 and prior has a vulnerable debug interface which includes a ping utility, which may allow an attacker to inject arbitrary operating system commands.

CVE-2021-43989 myscada vulnerability CVSS: 5.0 23 Dec 2021, 20:15 UTC

mySCADA myPRO Versions 8.20.0 and prior stores passwords using MD5, which may allow an attacker to crack the previously retrieved password hashes.

CVE-2021-43987 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

An additional, nondocumented administrative account exists in mySCADA myPRO Versions 8.20.0 and prior that is not exposed through the web interface, which cannot be deleted or changed through the regular web interface.

CVE-2021-43985 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

An unauthenticated remote attacker can access mySCADA myPRO Versions 8.20.0 and prior without any form of authentication or authorization.

CVE-2021-43984 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the firmware can be updated, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-43981 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-23198 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-22657 myscada vulnerability CVSS: 7.5 23 Dec 2021, 20:15 UTC

mySCADA myPRO: Versions 8.20.0 and prior has a feature where the API password can be specified, which may allow an attacker to inject arbitrary operating system commands through a specific parameter.

CVE-2021-43555 myscada vulnerability CVSS: 6.8 19 Nov 2021, 19:15 UTC

mySCADA myDESIGNER Versions 8.20.0 and prior fails to properly validate contents of an imported project file, which may make the product vulnerable to a path traversal payload. This vulnerability may allow an attacker to plant files on the file system in arbitrary locations or overwrite existing files, resulting in remote code execution.

CVE-2021-41578 myscada vulnerability CVSS: 6.8 04 Oct 2021, 18:15 UTC

mySCADA myDESIGNER 8.20.0 and below allows Directory Traversal attacks when importing project files. If an attacker can trick a victim into importing a malicious mep file, then they gain the ability to write arbitrary files to OS locations where the user has permission. This would typically lead to code execution.

CVE-2018-11517 myscada vulnerability CVSS: 5.0 28 May 2018, 16:29 UTC

mySCADA myPRO 7 allows remote attackers to discover all ProjectIDs in a project by sending all of the prj parameter values from 870000 to 875000 in t=0&rq=0 requests to TCP port 11010.

CVE-2018-11311 myscada vulnerability CVSS: 6.4 20 May 2018, 22:29 UTC

A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.

CVE-2017-12730 myscada vulnerability CVSS: 7.2 06 Oct 2017, 04:29 UTC

An Unquoted Search Path issue was discovered in mySCADA myPRO Versions 7.0.26 and prior. Application services utilize unquoted search path elements, which could allow an attacker to execute arbitrary code with elevated privileges.