• Thread Author
A major security vulnerability has been discovered in Packet Power’s EMX and EG products, exposing critical infrastructure worldwide to the risk of unauthorized remote access and control. The vulnerability, designated CVE-2025-8284, allows attackers to bypass authentication entirely, offering a stark reminder of how missing security controls in industrial systems can have catastrophic consequences. With a near-maximum CVSS v4 score of 9.3, this issue demands immediate attention from both operators of energy sector assets and organizations responsible for deploying Packet Power solutions around the globe.

A high-tech security command center with multiple monitors displaying digital shields and cyber network graphics.Background​

Packet Power specializes in wireless energy monitoring networks designed for critical environments such as data centers, utilities, and complex industrial operations. Their EMX and EG devices are essential components used to monitor, manage, and control power infrastructure in real time. These products are widely deployed, often forming the backbone of energy management systems in the United States and internationally.
Historically, the industrial control system (ICS) domain has lagged behind traditional IT sectors in terms of cybersecurity. The consequences of vulnerabilities in ICS platforms are profound, ranging from equipment damage to regulatory fines, or even safety incidents affecting public health. The stakes are particularly high when flaws exist in devices that manage or control energy flows—highlighting why this particular Packet Power vulnerability is receiving such high-priority attention.

The Vulnerability: What Happened?​

Missing Authentication for Critical Function (CWE-306)​

The heart of the problem lies in a classic but devastating oversight—EMX and EG devices shipped with web interfaces that do not require authentication for critical operations. This means anyone with network access to the affected devices can potentially:
  • View sensitive configuration and status data
  • Change device settings
  • Manipulate monitoring and control functions without logging in
The risk is not theoretical. A default configuration without enforced authentication is among the most dangerous flaws, as exploit complexity is minimal and almost no technical skill is needed to take advantage of it.

Technical Assessment​

  • Affected Products:
  • EMX: All versions prior to 4.1.0
  • EG: All versions prior to 4.1.0
  • CVSS Scores:
  • CVSS v3.1 Base Score: 9.8 (Critical)
  • CVSS v4 Base Score: 9.3 (Critical)
  • Attack Requirements:
  • Network access only (remote exploit)
  • No credentials required
  • No user interaction required
  • Potential Impact:
  • Full compromise of device
  • Manipulation of monitoring and control (potentially affecting facility operations)
The vulnerability was independently reported by security researchers Anthony Rose and Jacob Krasnov of BC Security, who disclosed it to the U.S. Cybersecurity and Infrastructure Security Agency (CISA). There is no evidence at this time of the exploit being used in the wild, but the exposure is considerable.

Impact on Critical Infrastructure​

Energy Sector and Beyond​

Packet Power’s primary customers operate in the energy sector—a space where reliability and resilience are paramount. Compromised monitoring devices can cause several layers of risk:
  • Data Center Operations: An attacker could disable alarms, corrupt energy usage metrics, or manipulate reporting, leaving operators blind to developing problems or escalating failures.
  • Grid Management: By modifying configuration data, malicious actors could affect load balancing, divert power, or even cause service interruptions.
  • Physical Safety and Regulatory Compliance: Manipulated control systems can result in unsafe equipment states, environmental incidents, or violations of operational regulations.
Given these risks, exposure in a national or multi-national context cannot be overstated. The devices are in use in facilities across North America, Europe, and Asia—making the vulnerability a global concern.

Deep Dive: Missing Authentication in ICS Devices​

Why Is Authentication Often Overlooked?​

In many operational technology (OT) environments, security is subordinate to availability and maintainability. Many ICS devices are:
  • Deployed in environments thought to be physically secure
  • Managed by teams without deep IT security experience
  • Configured using manufacturer defaults for speed and simplicity
As a result, authentication and access control frequently receive insufficient attention. However, even “air-gapped” networks are rarely as isolated as operators believe, amplifying the risks of device-level vulnerabilities.

Historical Precedent​

This is not the first time a lack of authentication has led to major security incidents in ICS products:
  • Industrial routers and PLCs have been compromised due to default or missing credentials
  • HVAC and building automation systems have been manipulated via unsecured web interfaces
  • Major worms such as Stuxnet leveraged weak access controls to devastating effect
In each case, the combination of high-value targets and low-barrier exploits resulted in massive operational and reputational damage.

Mitigation and Remediation​

Official Guidance​

Packet Power’s primary recommendation is straightforward: upgrade EMX and EG devices to firmware version 4.1.0 or higher, which enforces authentication on all management interfaces. Firmware updates should be prioritized for any system with internet or broad network exposure.
CISA, the U.S. government’s lead agency for ICS advisories, has issued additional best practices:
  • Network Segmentation: Limit all external access to control devices whenever possible—never expose ICS platforms directly to the internet.
  • Secure Remote Access: If remote management is necessary, use VPNs or other encrypted tunnels with multi-factor authentication. Keep remote access software, including VPNs, updated to the latest secure versions.
  • Monitor for Suspicious Activity: Maintain logging, enable alerts on unusual access or configuration changes, and conduct regular security assessments to catch abnormal behavior indicative of a breach.

Advanced Defensive Measures​

For organizations with mature security operations, deeper defense strategies are strongly advised:
  • Defense in Depth: Layer security tools and practices across the network, using firewalls, intrusion detection, and robust endpoint protections
  • Least Privilege: Limit credentials and access routes to absolutely necessary personnel
  • Routine Patch Management: Schedule regular updates of all ICS devices, not only after new vulnerabilities are disclosed
  • Incident Response Planning: Develop and test prebuilt procedures in case of a breach, including restoration from clean backups and immediate isolation of affected devices

Challenges of Securing ICS Networks​

Vulnerability Management Barriers​

ICS environments pose unique patching and remediation challenges:
  • Downtime Sensitivity: Many industrial environments run 24/7, with scheduled maintenance windows infrequent or costly
  • Legacy Systems: Frequently, operational technology runs on old hardware and software not readily upgradable
  • Complex Supply Chains: The path from vendor advisories to actual patch application can be long, fraught with organizational inertia and unclear responsibility

Human Factors​

Training and procedural rigor often lag behind technical risk management. Organizations must invest in:
  • Educating engineers and operators on cybersecurity basics
  • Developing clear ownership and escalation paths for security incidents
  • Bridging gaps between IT and OT teams to ensure consistent application of security controls

Industry Reaction and Lessons Learned​

The immediate response from both government and sector security analysts has been one of urgency—and not without criticism. While Packet Power responded promptly with a patch, the underlying problem—lack of default authentication in ICS devices—has been called a “preventable” and “basic” failure by several commentators.

Systemic Weaknesses Revealed​

This incident highlights several ongoing systemic issues in the ICS security space:
  • Vendors releasing products without security essentials
  • Operators not enabling optional security controls
  • Broad assumptions about network isolation that no longer hold in the era of remote and cloud-connected management
The vulnerability in EMX and EG is likely not isolated. Security analysts warn that similar flaws linger in ICS products across industries, calling for:
  • Rigorous product security testing before deployment
  • Regulatory standards mandating secure defaults
  • Greater transparency from vendors about vulnerability disclosures and patch timelines

Moving Forward: Building Resilience​

Proactive Security Posture​

The best defense is a proactive and layered approach:
  • Inventory All ICS Assets: Understand what devices are in your network, their function, and their exposure.
  • Prioritize Patching: Patch high-impact vulnerabilities first, especially those with remote exploit paths and no authentication required.
  • Continuously Assess Exposure: Use ongoing penetration testing and vulnerability scanning in simulated or non-production environments.
  • Insist on Secure-by-Default Products: Only select ICS vendors who make robust security, including strong authentication, a central feature.

Policy and Regulation​

Critical infrastructure agencies should accelerate the adoption of cybersecurity requirements for control systems. The use of third-party validation and certification (e.g., IEC 62443 compliance) can elevate baseline security across the entire supply chain.

Conclusion​

The discovery of a critical authentication bypass in Packet Power’s EMX and EG devices is a wake-up call for the entire industrial controls sector. As ICS platforms become both more ubiquitous and networked, even a single missing authentication setting can pose an existential risk to critical infrastructure. Swift patching, robust network segmentation, and a renewed commitment to proactive, layered defense are essential not only for surviving this incident but for building the kinds of resilient energy and industrial systems demanded by modern society.
Organizations must move quickly: enumerate exposed and affected devices, upgrade all vulnerable components, and harden network perimeters. This vulnerability, while serious, is also entirely preventable—if the lessons are learned and applied before the next zero-day emerges.

Source: CISA Packet Power EMX and EG | CISA
 

Back
Top