VulnerabilitiesHIGH

GPL Odorizers GPL750 - Vulnerability Exposed Critical Flaw

#GPL Odorizers#CVE-2026-4436#Industrial Control Systems#Critical Manufacturing#Modbus

Original Reporting

CICISA Advisories·CISA

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

Significant risk — action recommended within 24-48 hours

🛡️
🛡️ VULNERABILITY DETAILSCVE-2026-4436CVSS: 8.6
CVE IDCVE-2026-4436
CVSS Score8.6
Severity RatingHigh
Affected ProductGPL Odorizers GPL750 (XL4, XL4 Prime, XL7, XL7 Prime)
VendorGPL Odorizers
Vulnerability TypeMissing Authentication for Critical Function
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Actively ExploitedNot yet observed
Patch AvailableYes
Workaround Available
🎯

Basically, a flaw lets bad actors change gas odor levels remotely, which is dangerous.

Quick Summary

A serious vulnerability in GPL Odorizers GPL750 could allow remote attackers to manipulate gas line odorant levels. Users are urged to update their systems immediately to mitigate risks.

The Flaw

A significant vulnerability has been discovered in the GPL Odorizers GPL750 series. This flaw allows a low privileged remote attacker to manipulate register values. The result? An unsafe amount of odorant could be injected into a gas line, either too much or too little, which could lead to hazardous situations.

What's at Risk

The affected models include:

  • GPL750 (XL4) versions >=v1.0
  • GPL750 (XL4 Prime) versions >=v4.0
  • GPL750 (XL7) versions >=v13.0
  • GPL750 (XL7 Prime) versions >=v18.4

The vulnerability is classified as CVE-2026-4436 with a CVSS score of 8.6, indicating a high severity level. This flaw is particularly concerning for industries relying on accurate gas odorization for safety.

Patch Status

GPL Odorizers has acknowledged this vulnerability and recommends that users update their devices to the latest firmware. Users should ensure they are running the latest software versions in conjunction with firmware from Horner Automation. The specific firmware versions mentioned are:

  • XL Series: version 15.76
  • XL Prime Series: version 17.30

Immediate Actions

To mitigate this vulnerability, users should:

  1. Update to the latest software version.
  2. Clear old files from microSD cards, keeping only essential files.
  3. If necessary, request preconfigured SD cards from GPL Odorizers for easy installation.
  4. Contact GPL Odorizers directly for support at (303) 697-6701 during business hours.

Conclusion

This vulnerability highlights the importance of maintaining up-to-date systems in critical infrastructure. Organizations should take proactive measures to secure their industrial control systems and minimize exposure to potential attacks. The CISA also recommends users implement defensive measures to protect their networks and systems from exploitation.

🔍 How to Check If You're Affected

  1. 1.Verify if your GPL Odorizers GPL750 is running an affected version.
  2. 2.Check for any unusual gas odor levels in operations.
  3. 3.Review system logs for unauthorized access attempts.
  4. 4.Ensure that your device firmware is updated to the latest version.

🏢 Impacted Sectors

Critical Manufacturing

Pro Insight

🔒 Pro insight: This vulnerability underscores the critical need for robust authentication in industrial control systems to prevent unauthorized access.

Sources

Original Report

CICISA Advisories· CISA
Read Original

Related Pings

HIGHVulnerabilities

RomM 4.4.0 - Critical XSS/CSRF Vulnerability Discovered

A critical vulnerability in RomM 4.4.0 allows attackers to take over admin accounts via XSS and CSRF. Users must update to version 4.4.1 to avoid risks. Stay safe!

Exploit-DB·
HIGHVulnerabilities

ZSH 5.9 Vulnerability - Remote Code Execution Exploit

A serious vulnerability in ZSH 5.9 allows remote code execution. This puts Linux systems at significant risk. Users are urged to update their software and monitor for suspicious activity.

Exploit-DB·
HIGHVulnerabilities

Jumbo Website Manager - Remote Code Execution Vulnerability

A serious vulnerability in Jumbo Website Manager allows remote code execution, risking user data and server security. Organizations should take immediate steps to protect their systems.

Exploit-DB·
CRITICALVulnerabilities

Contemporary Controls BASC 20T - Critical Vulnerability Exposed

A critical vulnerability in the Contemporary Controls BASC 20T could allow attackers to manipulate PLC components. Users must act quickly to secure their systems against potential exploitation.

CISA Advisories·
HIGHVulnerabilities

Android Intent Redirection Vulnerability Exposes Millions

A severe vulnerability in EngageSDK risks sensitive data across millions of Android wallets. Developers must update their SDKs to protect users. This flaw highlights the importance of secure third-party integrations.

Microsoft Security Blog·
HIGHVulnerabilities

Internet-Exposed ICS Devices Raise Security Risks

Exposed ICS devices using insecure protocols like Modbus raise serious security concerns. Critical sectors may face disruptions and sabotage. Urgent action is needed to secure these systems.

Security Affairs·