CVE-2026-22208

CRITICAL
2026-02-17 [email protected]
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
CVE Published
Feb 17, 2026 - 15:16 nvd
CRITICAL 9.6

Tags

Description

OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.

Analysis

Remote code execution in OpenS100 (S-100 viewer reference implementation) prior to commit 753cf29. Malicious S-100 dataset files can trigger code execution when opened. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify all systems running OpenS100 and isolate them from production networks if possible; disable S-100 file uploads and restrict access to trusted sources only. Within 7 days: Implement network segmentation to limit lateral movement from compromised OpenS100 instances; deploy web application firewall rules to block suspicious Lua interpreter invocations; establish continuous monitoring for exploitation attempts. …

Sign in for detailed remediation steps.

Priority Score

48
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +48
POC: 0

Share

CVE-2026-22208 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy