A water tank management system used by organizations worldwide is affected by a critical vulnerability that can be exploited remotely and the vendor does not appear to want to patch it.
The affected product is made by the water and energy unit of Irish building materials company Kingspan. The Kingspan TMS300 CS water tank management system provides tank level information via a screen, web server, application, online portal or email. It features wired and wireless multi-tank level measurements, alarms, and internet or local network connectivity.
According to an advisory published this week by CISA, researcher Maxim Rupp discovered that the product is affected by a critical vulnerability caused by the lack of properly implemented access control rules, which allows an unauthenticated attacker to view or modify the device’s settings.
The researcher discovered that an attacker can access the device’s settings without authenticating, simply by navigating to specific URLs. These URLs can be identified by browsing the web interface or via a brute force attack, Rupp told SecurityWeek.
The flaw has been assigned the CVE identifier CVE-2022-2757 and a CVSS score of 9.8.
These devices can be configured to be accessible from the internet. An attacker can exploit the security hole from anywhere as long as they have access to the device’s web interface, Rupp explained.
Based on the product’s documentation, Rupp said an attacker could change various settings after exploiting this vulnerability, including ones related to sensors, tank details, and alarm thresholds.
It appears that the exposed settings could allow a hacker to cause some disruption in the targeted organization.
Learn more about industrial product vulnerabilities at
SecurityWeek’s 2022 ICS Cyber Security Conference
According to CISA, the impacted product is used worldwide in the water and wastewater systems sector. The agency says the vulnerability remains unpatched.
“Kingspan has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected product are encouraged to contact Kingspan customer support for additional information,” CISA said.
SecurityWeek has also reached out to the company for comment, but received no response.
CISA has provided some general recommendations for reducing the risk posed by these types of vulnerabilities.
Related: Hack Exposes Vulnerability of Cash-Strapped US Water Plants
Related: US Says National Water Supply ‘Absolutely’ Vulnerable to Hackers
Related: Smart Irrigation Systems Expose Water Utilities to Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
