AVEVA Pipeline Simulation Flaw Lets Attackers Manipulate Oil and Gas Training Systems
CVE-2026-5387 gives unauthenticated attackers admin access to pipeline simulation environments. CVSS 9.3 - affects oil, gas, and chemical sectors.
CISA issued an advisory for CVE-2026-5387, a critical authorization flaw in AVEVA Pipeline Simulation that allows unauthenticated attackers to perform administrative operations. The vulnerability carries a CVSS v4.0 score of 9.3.
Pipeline simulation software is used by oil and gas companies, chemical processors, and utilities to train operators and model system behavior. Unauthorized access to these environments could let attackers manipulate simulation parameters, corrupt training data, or create false safety analyses that carry over into real-world operations.
What the Vulnerability Allows
CVE-2026-5387 is a missing authorization vulnerability (CWE-862). The software fails to verify whether API requests come from authorized users, allowing anyone with network access to invoke functions reserved for Simulator Instructor or Simulator Developer roles.
An unauthenticated attacker can:
- Modify simulation parameters used for operator training
- Alter training configurations and assessment criteria
- Access or delete training records
- Potentially influence safety modeling outcomes
The attack vector is network-based with low complexity. No authentication is required, and no user interaction is needed. If the simulation environment is reachable — whether directly exposed or accessible through lateral movement — exploitation is trivial.
Affected Versions and the Fix
The vulnerability affects AVEVA Pipeline Simulation versions through 2025_SP1_build_7.1.9497.6351. AVEVA has released a patched version: Pipeline Simulation 2025 SP1 P01 (build 7.1.9580.8513) or higher.
Organizations running older versions should upgrade immediately. CISA's advisory (ICSA-26-106-04) recommends additional mitigations for those who cannot patch immediately:
- Implement host-based and network firewall controls to restrict access to simulation systems
- Enable TLS for all API communications to prevent network-based interception
- Segment simulation environments from operational networks
- Monitor access logs for unauthorized API calls
Why Pipeline Simulation Matters
Simulation environments might seem like low-risk targets compared to actual operational technology. But the training-to-operations pipeline creates subtle attack opportunities.
Operators trained on manipulated simulations may develop incorrect response patterns. Safety analyses based on corrupted parameters may underestimate risks. And in integrated environments, simulation systems may share network access with production SCADA infrastructure.
The recent CISA advisory on Iranian PLC attacks highlighted how nation-state actors are actively targeting operational technology across water, energy, and manufacturing sectors. Pipeline simulation fits the same threat profile: critical infrastructure, industrial control systems, and often-overlooked attack surface.
ICS Vulnerabilities Clustering in April
This isn't AVEVA's only appearance in recent ICS advisories. CISA released multiple industrial control system bulletins on April 16, covering products from Hitachi Energy, Schneider Electric, and AVEVA itself.
The pattern matches what we're seeing across the broader vulnerability landscape. April's Patch Tuesday cycle brought critical fixes from Microsoft, Fortinet, and SAP alongside these ICS-specific disclosures. Security teams are being asked to patch across enterprise IT, cloud infrastructure, and operational technology simultaneously.
No Known Exploitation — For Now
CISA notes that no public exploitation targeting CVE-2026-5387 has been reported. But the vulnerability's characteristics — unauthenticated, network-accessible, low complexity — make it a straightforward target once attack tooling circulates.
Critical infrastructure sectors have historically been slower to patch than enterprise IT. Air-gapped networks, change management requirements, and 24/7 operational demands create friction. That friction gives attackers time.
Organizations running AVEVA Pipeline Simulation should treat this patch as urgent. The OT malware campaigns we've tracked recently demonstrate that industrial systems are actively being targeted — training environments included.
Recommended Actions
- Upgrade to Pipeline Simulation 2025 SP1 P01 (build 7.1.9580.8513) or higher
- Verify network segmentation — simulation systems should not be directly reachable from untrusted networks
- Audit API access logs for unauthorized requests
- Implement firewall rules restricting access to simulation server ports
- Enable TLS for all simulation API communications
For organizations that cannot immediately patch, network-level controls become the primary defense. AVEVA's security bulletin (AVEVA-2026-004) provides additional technical guidance for mitigating exposure while planning upgrade windows.
Related Articles
Honeywell BMS Controllers Ship With No Authentication by Design
CVE-2026-3611 exposes Honeywell IQ4x building management controllers with CVSS 10 severity. Default configuration allows anyone to create admin accounts.
Mar 19, 2026CISA Releases 10 ICS Advisories for Siemens, Schneider, Others
Industrial control system vulnerabilities disclosed in Siemens RUGGEDCOM, Industrial Edge devices, Schneider EcoStruxure, AVEVA, and Festo products.
Jan 18, 2026Iconics SCADA Flaw Allows System File Corruption
CVE-2025-0921 enables privileged file system operations that can disrupt industrial control systems in automotive, energy, and manufacturing environments.
Feb 1, 2026ZionSiphon Malware Targets Israeli Water Treatment Systems
Darktrace researchers expose ZionSiphon, OT malware designed to sabotage chlorine levels and pressure controls at Israeli desalination plants. A coding error currently prevents activation.
Apr 17, 2026