Connect with us

Hi, what are you looking for?



Critical Vulnerabilities Expose ​​Weintek HMIs to Attacks

Weintek has patched critical and high-severity vulnerabilities found in its cMT series HMIs by industrial cybersecurity firm TXOne. 

The US cybersecurity agency CISA last week warned organizations about critical- and high-severity vulnerabilities discovered by researchers in a human-machine interface (HMI) product made by Taiwan-based Weintek.

According to CISA, the impacted product, the Weintek cMT HMI, is used worldwide, including in critical manufacturing organizations, which are considered part of critical infrastructure. The vendor has released patches for cMT3000-series, cMT-HDM, and cMT-FHD products.

A total of three vulnerabilities have been found in the HMI by industrial cybersecurity firm TXOne Networks. They can be exploited by anonymous users to bypass the authentication process or execute arbitrary commands after they log in to the targeted device.

“By combining [the vulnerabilities], a remote attacker may gain access to the system or remotely execute commands without authentication via the web server whose OS version is listed as affected,” Weintek said in its own advisory last week. 

Hank Chen, the TXOne Networks researcher credited for finding the vulnerabilities, told SecurityWeek that the flaws could allow an attacker to take complete control of an HMI. 

However, Chen noted that while an attacker does not require any special permissions to launch a DoS attack, executing arbitrary commands requires the HMI’s password. 

The researcher said there are some impacted Weintek HMIs that are directly exposed to the internet, but such instances are “quite limited”.

TXOne has published a blog post providing technical details for each of the vulnerabilities. 

Advertisement. Scroll to continue reading.

This is not the first time TXOne researchers have found vulnerabilities in Weintek products. Earlier this year, CISA informed organizations about several issues identified by TXOne in the Weincloud cloud-based HMI, which could allow an attacker to manipulate and damage industrial control systems (ICS), such as PLCs and field devices.

Learn More at SecurityWeek’s ICS Cyber Security Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.
ICS Cybersecurity Conference
October 23-26, 2023 | Atlanta

Related: Vulnerabilities Can Allow Attackers to Remotely Gain Control of Weintek HMIs

Related: Unpatched Vulnerabilities Expose Yifan Industrial Routers to Attacks

Related: Milesight Industrial Router Vulnerability Possibly Exploited in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content


The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).


Cybersecurity firm Forescout shows how various ICS vulnerabilities can be chained for an exploit that allows hackers to cause damage to a bridge.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


More than 1,300 ICS vulnerabilities were discovered in 2022, including nearly 1,000 that have a high or critical severity rating.