CVE-2026-22208: OpenS100 RCE — Critical — Patch Now
CVE-2026-22208
OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua usi...
Overview
A critical security vulnerability exists in OpenS100, the reference implementation viewer for S-100 nautical chart data. This flaw allows an attacker to execute arbitrary code on a user’s computer simply by tricking them into opening a maliciously crafted chart catalogue.
Vulnerability Explained
OpenS100 uses the Lua scripting language to process chart portrayal rules. The vulnerability exists because the software does not restrict what these Lua scripts are allowed to do. It provides the scripts with full access to powerful system libraries, including those for file operations and running system commands.
In simple terms, it’s like giving a visitor to your house not just a tour, but also the keys to every room, the safe, and the control panel, with no supervision. An attacker can embed malicious instructions within a seemingly normal chart file. When a user opens this file, the instructions run automatically, taking control of the application.
Potential Impact
The impact of this vulnerability is severe. Successful exploitation can lead to:
- Full System Compromise: An attacker can run any command on the victim’s machine, potentially deleting files, stealing data, or installing malware like ransomware or spyware.
- Privilege Escalation: The malicious code runs with the same permissions as the OpenS100 process. If a user runs the software with administrative rights, the attacker could gain full control of the entire system.
- Persistence: Attackers could establish a backdoor, ensuring continued access to the infected computer.
- Targeted Attacks: Given OpenS100’s use in maritime contexts, targeted attacks against shipping companies, port authorities, or naval organizations are a significant concern.
Remediation and Mitigation
Immediate action is required to secure affected systems.
Primary Remediation:
- Upgrade Immediately: All users must update to a version of OpenS100 that includes commit
753cf29or later. This commit introduces proper sandboxing to restrict the Lua interpreter’s capabilities. Obtain the latest version from the official project repository or distribution channel.
Interim Mitigations (if unable to update immediately):
- Exercise Extreme Caution with Files: Do not open S-100 portrayal catalogues or chart data from untrusted or unknown sources. Treat unsolicited chart files with high suspicion.
- Run with Least Privilege: Avoid running the OpenS100 application with administrator or root privileges. Use a standard user account to limit the potential damage from executed code.
- Network Segmentation: On operational networks, consider isolating systems running OpenS100 from critical network segments to limit lateral movement in case of a breach.
- Monitor for Updates: Proactively check the official OpenS100 project channels for the patched release and apply it as soon as operationally possible.
Organizations should prioritize updating this software due to the ease with which this critical vulnerability can be exploited.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke un...
Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A cr...
ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the database backup restore functionality extracts uploaded archive contents and copies files from the Images/ directo...
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment ...