{
  "type": "bundle",
  "id": "bundle--e2606bb4-b485-4d31-9c18-4416113ef26e",
  "objects": [
    {
      "type": "report",
      "spec_version": "2.1",
      "id": "report--db7355f5-9b4f-49ea-92bc-c7abe50dbd9f",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "AVEVA Pipeline Simulation",
      "description": "The following versions of AVEVA Pipeline Simulation are affected: Pipeline Simulation <=2025_SP1_build_7.1.9497.6351 CVSS Vendor Equipment Vulnerabilities v3 9.1 AVEVA AVEVA Pipeline Simulation Missing Authorization Background Critical Infrastructure Sectors: Critical Manufacturing Countries/Areas Deployed: Worldwide Company Headquarters Location: United Kingdom Vulnerabilities Expand All + CVE-2026-5387 The vulnerability, if exploited, could allow an unauthenticated miscreant to perform operations intended only for Simulator Instructor or Simulator Developer (Administrator) roles, resulting in privilege escalation with potential for modification of simulation parameters, training configuration, and training...",
      "published": "2026-04-16T12:00:00.000Z",
      "report_types": [
        "threat-report"
      ],
      "object_refs": [
        "vulnerability--d757f347-dc4d-49e6-8dc3-a28b0c22102f",
        "attack-pattern--a0605198-4826-4c92-8f19-d92af2ba7df5",
        "attack-pattern--c276fa77-ee51-4573-a0fb-779e84636c84",
        "attack-pattern--39bec044-e415-4629-8f6b-ef5b7d736e2d"
      ],
      "external_references": [
        {
          "source_name": "CISA Advisories",
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-106-04",
          "description": "AVEVA Pipeline Simulation"
        }
      ],
      "labels": [
        "Energy",
        "Government",
        "Technology",
        "Critical Infrastructure",
        "Manufacturing"
      ]
    },
    {
      "type": "vulnerability",
      "spec_version": "2.1",
      "id": "vulnerability--d757f347-dc4d-49e6-8dc3-a28b0c22102f",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "CVE-2026-5387",
      "external_references": [
        {
          "source_name": "cve",
          "external_id": "CVE-2026-5387",
          "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5387"
        }
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--a0605198-4826-4c92-8f19-d92af2ba7df5",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Command and Scripting Interpreter",
      "external_references": [
        {
          "source_name": "mitre-attack",
          "external_id": "T1059",
          "url": "https://attack.mitre.org/techniques/T1059/"
        }
      ],
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "execution"
        }
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--c276fa77-ee51-4573-a0fb-779e84636c84",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Exploitation for Privilege Escalation",
      "external_references": [
        {
          "source_name": "mitre-attack",
          "external_id": "T1068",
          "url": "https://attack.mitre.org/techniques/T1068/"
        }
      ],
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "privilege-escalation"
        }
      ]
    },
    {
      "type": "attack-pattern",
      "spec_version": "2.1",
      "id": "attack-pattern--39bec044-e415-4629-8f6b-ef5b7d736e2d",
      "created": "2026-04-20T09:05:57.000Z",
      "modified": "2026-04-20T09:05:57.000Z",
      "name": "Adversary-in-the-Middle",
      "external_references": [
        {
          "source_name": "mitre-attack",
          "external_id": "T1557",
          "url": "https://attack.mitre.org/techniques/T1557/"
        }
      ],
      "kill_chain_phases": [
        {
          "kill_chain_name": "mitre-attack",
          "phase_name": "credential-access"
        }
      ]
    }
  ]
}