Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Mar 19, 2025Ravie LakshmananVulnerability / Network Security

Cybersecurity researchers have revealed details about two critical vulnerabilities affecting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system utilized in operational technology (OT) environments, which could potentially enable malicious actors to gain control of vulnerable systems.

“If exploited, these vulnerabilities could provide unauthorized access to industrial control networks, potentially resulting in significant operational disruptions and financial consequences,” stated Swiss security firm PRODAFT in a report.

The identified vulnerabilities, both rated 9.3 on the CVSS v4 scoring system, are as follows:

  • CVE-2025-20014 – A flaw allowing operating system command injection through specially crafted POST requests with a version parameter
  • CVE-2025-20061 – A vulnerability facilitating operating system command injection via specially crafted POST requests with an email parameter

Exploiting either of these flaws could enable an attacker to inject system commands and execute arbitrary code. The issues have been remediated in the following versions:

  • mySCADA PRO Manager 1.3
  • mySCADA PRO Runtime 9.2.1

According to PRODAFT, both vulnerabilities result from a lack of properly sanitizing user inputs, leaving the door open to command injection attacks.

“These vulnerabilities underscore the ongoing security risks in SCADA systems and the necessity for robust defenses,” the company emphasized. “Exploitation could result in operational disruptions, financial losses, and safety hazards.”

Organizations are advised to apply the latest patches, implement network segmentation by isolating SCADA systems from IT networks, enforce strong authentication mechanisms, and monitor for suspicious activities.

Enjoyed this article? Stay updated by following us on Twitter and LinkedIn for more exclusive content.