INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h
Vulnerabilities

CVE-2014-0780

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
InduSoft Web Studio NTWebServer Directory Traversal Vulnerability (CVE-2014-0780)
Published: Apr 15, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

InduSoft Web Studio NTWebServer Directory Traversal Vulnerability — InduSoft Web Studio NTWebServer contains a directory traversal vulnerability that allows remote attackers to read administrative passwords in APP files, allowing for remote code execution.

🤖 AI Executive Summary

InduSoft Web Studio NTWebServer contains a critical directory traversal vulnerability (CVSS 9.0) that allows remote attackers to read administrative passwords from APP files, leading to potential remote code execution. Active exploits exist with no official patch available, posing severe risks to industrial control systems.

📄 Description (Arabic)

تسمح هذه الثغرة الأمنية الحرجة للمهاجمين باستغلال نقاط ضعف اجتياز الدليل في خادم NTWebServer للوصول إلى ملفات APP التي تحتوي على بيانات اعتماد إدارية حساسة. بمجرد الحصول على كلمات المرور، يمكن للمهاجمين تنفيذ تعليمات برمجية عشوائية على النظام المستهدف والسيطرة الكاملة على بيئة SCADA. تشكل هذه الثغرة خطراً كبيراً على البنية التحتية الحيوية والمنشآت الصناعية التي تعتمد على أنظمة InduSoft Web Studio للمراقبة والتحكم. عدم توفر تصحيح رسمي ووجود استغلالات نشطة يزيد من حدة التهديد بشكل كبير.

🤖 ملخص تنفيذي (AI)

يحتوي خادم NTWebServer في برنامج InduSoft Web Studio على ثغرة حرجة في اجتياز الدليل (درجة CVSS 9.0) تسمح للمهاجمين عن بُعد بقراءة كلمات المرور الإدارية من ملفات APP، مما يؤدي إلى إمكانية تنفيذ التعليمات البرمجية عن بُعد. توجد استغلالات نشطة دون وجود تصحيح رسمي، مما يشكل مخاطر شديدة على أنظمة التحكم الصناعية.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 10:14
🇸🇦 Saudi Arabia Impact Assessment
Saudi industrial facilities, oil and gas operations, water treatment plants, and critical infrastructure using InduSoft Web Studio face severe risks of unauthorized access and operational disruption. Attackers could gain complete control over SCADA systems, potentially causing production shutdowns, safety incidents, or sabotage of critical national infrastructure.
🏢 Affected Saudi Sectors
النفط والغاز الطاقة والمياه التصنيع البتروكيماويات البنية التحتية الحيوية المرافق العامة الصناعات التحويلية
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately isolate all InduSoft Web Studio NTWebServer instances from internet-facing networks and implement strict network segmentation with firewall rules allowing only authorized internal access
2. Deploy compensating controls including Web Application Firewall (WAF) rules to block directory traversal attempts, implement strong authentication mechanisms, and enable comprehensive logging and monitoring for suspicious access patterns
3. Evaluate migration to alternative SCADA/HMI platforms with active vendor support, or upgrade to the latest InduSoft/AVEVA System Platform versions if available, and conduct thorough security assessments before redeployment
🔧 خطوات المعالجة (العربية)
1. عزل جميع نسخ خادم NTWebServer في InduSoft Web Studio فوراً عن الشبكات المتصلة بالإنترنت وتطبيق تجزئة صارمة للشبكة مع قواعد جدار الحماية التي تسمح فقط بالوصول الداخلي المصرح به
2. نشر ضوابط تعويضية تشمل قواعد جدار حماية تطبيقات الويب (WAF) لحظر محاولات اجتياز الدليل، وتطبيق آليات مصادقة قوية، وتفعيل التسجيل والمراقبة الشاملة لأنماط الوصول المشبوهة
3. تقييم الانتقال إلى منصات SCADA/HMI بديلة مع دعم نشط من المورّد، أو الترقية إلى أحدث إصدارات InduSoft/AVEVA System Platform إن وُجدت، وإجراء تقييمات أمنية شاملة قبل إعادة النشر
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2: Network Security ECC-2-1: Vulnerability Management ECC-3-1: Access Control ECC-4-3: Security Monitoring ECC-5-1: Critical Infrastructure Protection
🔵 SAMA CSF
SAMA-CR-1.2: Asset Management SAMA-CR-2.3: Vulnerability Management SAMA-CR-3.1: Network Segmentation SAMA-CR-4.2: Access Control
🟡 ISO 27001:2022
A.12.6.1: Management of Technical Vulnerabilities A.13.1.3: Segregation in Networks A.9.1.2: Access to Networks and Network Services A.12.4.1: Event Logging
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
InduSoft:Web Studio
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS89.25%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-06
Published 2022-04-15
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.