CISA Adds Actively Exploited OpenPLC XSS Flaw to KEV Catalog After Hacktivist Attacks

CISA Orders Federal Agencies to Patch OpenPLC ScadaBR XSS Flaw (CVE-2021-26829) Following Active Exploitation by Pro-Russian Group TwoNet

CRITICAL
November 28, 2025
7m read
VulnerabilityIndustrial Control SystemsThreat Actor

Related Entities

Threat Actors

TwoNet

Organizations

Products & Tech

OpenPLC ScadaBR

Other

United States

CVE Identifiers

CVE-2021-26829
MEDIUM
CVSS:5.4

Full Report

Executive Summary

On November 28, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a cross-site scripting (XSS) vulnerability in OpenPLC ScadaBR to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability, tracked as CVE-2021-26829, is being actively exploited by the pro-Russian hacktivist group TwoNet. The group was observed using the flaw to deface the Human-Machine Interface (HMI) of what they believed to be a water treatment facility. Due to the confirmed in-the-wild exploitation, CISA has issued a directive under BOD 22-01 requiring Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerability by December 19, 2025. This action highlights the growing threat of hacktivist groups targeting critical infrastructure and Industrial Control Systems (ICS).


Vulnerability Details

  • CVE ID: CVE-2021-26829
  • CVSS Score: 5.4 (Medium)
  • Vulnerability Type: Stored Cross-Site Scripting (XSS)
  • Affected Software: OpenPLC ScadaBR versions up to 1.12.4 (Windows) and 0.9.1 (Linux).
  • Description: The vulnerability exists in the system_settings.shtm page. An authenticated attacker can inject arbitrary web script or HTML, which will be executed in the browser of any user who views the page. While the CVSS score is medium, the impact in an ICS environment can be severe, allowing for HMI defacement, session hijacking, or redirecting operators to malicious sites.

Exploitation Status

The pro-Russian hacktivist group TwoNet was observed by Forescout researchers exploiting this vulnerability in September 2025. The attack sequence was as follows:

  1. The attackers gained initial access using default credentials.
  2. They created a new user account named BARLATI for persistence.
  3. They exploited CVE-2021-26829 to inject a script that created a pop-up message on the HMI login page reading "HACKED BY BARLATI."
  4. They also disabled system logs and alarms to cover their tracks.

Technical Analysis

The attack demonstrates a simple but effective methodology for disrupting ICS operations.


Impact Assessment

While TwoNet's attack was on a honeypot, the impact on a real water treatment facility could be significant. HMI defacement can cause confusion and panic among operators, potentially leading them to take incorrect actions or shut down processes unnecessarily. An attacker could also use the XSS flaw to steal an operator's session cookie, allowing them to hijack a legitimate session and issue malicious commands to the PLC, such as opening or closing valves. Disabling alarms prevents operators from being notified of dangerous process conditions, which could lead to physical damage or safety incidents. The addition to the KEV catalog signifies that CISA views this as a credible and urgent threat to critical infrastructure.


Cyber Observables for Detection

Type Value Description
log_source Web server logs Monitor for POST requests to system_settings.shtm containing HTML/JavaScript tags like <script> or <img>.
user_account_pattern BARLATI The creation of a user account with this name is a direct indicator of this specific actor's activity.
log_source PLC/HMI audit logs Monitor for the disabling of alarms or logging functions, which is highly anomalous behavior.
network_traffic_pattern Outbound connections from SCADA systems Any unexpected outbound connections from an HMI or SCADA server should be investigated.

Detection & Response

  1. Web Application Firewall (WAF): Deploy a WAF in front of the ScadaBR web interface to inspect incoming requests for malicious payloads, such as XSS scripts. This aligns with D3FEND's Inbound Traffic Filtering.
  2. Integrity Monitoring: Monitor critical system configuration files and web page content for unauthorized changes. An alert should be generated if system_settings.shtm or the login page is modified. This is a form of D3FEND's File Analysis.
  3. Audit Log Review: Regularly audit HMI and system logs for suspicious events, such as the creation of new users or changes to security settings. The unexplained disabling of logging should be an immediate red flag.

Response: If exploitation is suspected, the immediate priority is to verify the integrity of the process control environment. Isolate the affected HMI from the control network if possible, force a password reset for all users, and restore the affected web pages from a known-good backup.


Mitigation

  1. Patch Immediately: The primary mitigation is to update OpenPLC ScadaBR to a version that remediates CVE-2021-26829. Per CISA's directive, this is mandatory for federal agencies. This is D3FEND's Software Update.
  2. Change Default Credentials: Immediately change all default usernames and passwords on all ICS/OT devices, including HMIs and PLCs. This would have prevented the initial access in this attack.
  3. Network Segmentation: Isolate the ICS network from the corporate IT network and the internet. HMIs should not be directly accessible from the internet. This is a critical control for OT security, aligning with D3FEND's Network Isolation.
  4. Implement MFA: Where possible, enforce multi-factor authentication for access to HMI and SCADA systems to provide an additional layer of security beyond passwords.

Timeline of Events

1
September 1, 2025
Forescout observes the TwoNet group exploiting CVE-2021-26829 against an ICS honeypot.
2
November 28, 2025
CISA adds CVE-2021-26829 to the Known Exploited Vulnerabilities (KEV) catalog.
3
November 28, 2025
This article was published
4
December 19, 2025
Deadline for U.S. Federal Civilian Executive Branch agencies to patch the vulnerability.

MITRE ATT&CK Mitigations

Applying the vendor patch is the most direct way to eliminate the vulnerability.

Mapped D3FEND Techniques:

Changing default credentials and enforcing strong password policies prevents the easy initial access leveraged by the attackers.

Isolating the OT network from the internet and corporate networks drastically reduces the attack surface for ICS components.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most critical and immediate action is to update all instances of OpenPLC ScadaBR to a patched version that remediates CVE-2021-26829. Given that this vulnerability is in the CISA KEV catalog, it represents a clear and present danger. Asset owners should prioritize patching internet-facing systems first, followed by internal systems. A comprehensive asset inventory is crucial to ensure all vulnerable instances are identified and updated. This action directly removes the vulnerability from the environment, making exploitation impossible.

As a foundational principle for ICS security, ensure that all ScadaBR HMIs and other control system components are not directly exposed to the internet. Implement strict network segmentation using firewalls to create a secure enclave for the OT environment, following the Purdue Model. All traffic between the IT and OT networks should be mediated through a DMZ and explicitly allowed. This control would have prevented the attackers from gaining initial access, even with default credentials, as they would have had no network path to the HMI.

Immediately conduct an audit of all accounts on OpenPLC ScadaBR systems and other ICS components to identify and change any default credentials. The attackers' initial access vector was default credentials, a completely preventable issue. Implement a policy that mandates strong, unique passwords for all accounts, and disable or remove any unused default accounts. This simple act of security hygiene is one of the most effective controls for hardening ICS devices against opportunistic attacks.

Sources & References

CISA orders govt agencies to patch OpenPLC bug exploited by hackers
BleepingComputer (bleepingcomputer.com) November 30, 2025
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
The Hacker News (thehackernews.com) November 30, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CISAKEVCVE-2021-26829OpenPLCICSOTSCADATwoNetHacktivism

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading