Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-1697

CVE-2026-1697: PcVue XSS Vulnerability in Web Services

CVE-2026-1697 is an XSS vulnerability in PcVue's GraphicalData web services and WebClient app due to missing Secure and SameSite cookie attributes. This article covers the technical details, affected versions, and mitigation strategies.

Published: February 27, 2026

CVE-2026-1697 Overview

CVE-2026-1697 is a session management vulnerability affecting the GraphicalData web services and WebClient web application components of PcVue SCADA software. The vulnerability stems from missing Secure and SameSite cookie attributes, which could allow attackers to intercept or manipulate session cookies under certain conditions, potentially leading to session hijacking or cross-site request forgery attacks.

Critical Impact

Missing cookie security attributes in PcVue's web components expose industrial control system interfaces to potential session-based attacks, creating risk for critical infrastructure environments.

Affected Products

  • PcVue version 12.0.0 through 16.3.3 (inclusive)
  • PcVue GraphicalData Web Services
  • PcVue WebClient Web Application

Discovery Timeline

  • 2026-02-26 - CVE CVE-2026-1697 published to NVD
  • 2026-02-26 - Last updated in NVD database

Technical Details for CVE-2026-1697

Vulnerability Analysis

This vulnerability is classified under CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute). The absence of proper cookie security attributes in PcVue's web components creates conditions where session cookies may be transmitted over unencrypted connections or be vulnerable to cross-site request forgery attacks.

When web applications fail to set the Secure flag on cookies, browsers may transmit those cookies over unencrypted HTTP connections, even if the application is served over HTTPS. Similarly, the absence of the SameSite attribute allows cookies to be sent with cross-origin requests, potentially enabling CSRF attacks where an attacker tricks an authenticated user's browser into making unauthorized requests.

In the context of industrial control systems like PcVue, which is used for SCADA and HMI applications, this vulnerability could allow attackers to hijack operator sessions or perform unauthorized actions against critical infrastructure components.

Root Cause

The root cause is improper session cookie configuration in the GraphicalData web services and WebClient web application. The application fails to set the Secure attribute, which would restrict cookie transmission to HTTPS connections only, and the SameSite attribute, which would control cross-origin request behavior for cookies.

Attack Vector

The vulnerability is exploitable over a network-based attack vector requiring user interaction. An attacker could exploit this vulnerability through several scenarios:

  1. Man-in-the-Middle (MitM) Attack: If a user accesses the PcVue web interface and any request is made over HTTP (even accidentally), the session cookie could be intercepted by an attacker positioned on the network path.

  2. Cross-Site Request Forgery (CSRF): An attacker could craft a malicious webpage that, when visited by an authenticated PcVue user, triggers unauthorized requests to the PcVue interface using the victim's session cookies.

The vulnerability does not require prior authentication to exploit, though an authenticated victim session is required for the attack to have meaningful impact.

Detection Methods for CVE-2026-1697

Indicators of Compromise

  • Unusual cross-origin requests to PcVue GraphicalData or WebClient endpoints
  • HTTP (non-HTTPS) traffic containing session cookies for PcVue web services
  • Unexpected administrative actions in PcVue audit logs that correlate with user browsing activity on untrusted sites
  • Session tokens appearing in network traffic captures over unencrypted channels

Detection Strategies

  • Configure web application firewalls to monitor for suspicious cross-origin requests to PcVue endpoints
  • Implement network monitoring to detect any HTTP (non-HTTPS) traffic to PcVue web services
  • Review browser console logs and server-side access logs for unusual request patterns indicative of CSRF attempts
  • Deploy endpoint detection capabilities to identify potential MitM positioning on networks serving PcVue infrastructure

Monitoring Recommendations

  • Enable detailed logging on PcVue web services to track all authentication and session-related events
  • Monitor for session cookie transmission over non-HTTPS connections using network analysis tools
  • Implement anomaly detection for user behavior patterns that may indicate session hijacking
  • Review referrer headers in web server logs to identify potential CSRF attack attempts

How to Mitigate CVE-2026-1697

Immediate Actions Required

  • Upgrade PcVue to a version newer than 16.3.3 that includes the security fix
  • Ensure all PcVue web services are accessed exclusively over HTTPS with HTTP Strict Transport Security (HSTS) enabled
  • Implement network segmentation to limit access to PcVue web interfaces from trusted networks only
  • Configure reverse proxies or load balancers in front of PcVue to add Secure and SameSite cookie attributes at the network edge if immediate patching is not possible

Patch Information

The vendor has released a security bulletin addressing this vulnerability. Refer to the PCVue Security Bulletin SB2026-2 for detailed patch information and updated software versions that remediate this issue.

Organizations should prioritize applying the patch, especially in environments where PcVue is used for critical infrastructure monitoring and control.

Workarounds

  • Deploy a reverse proxy (such as NGINX or Apache) in front of PcVue web services configured to inject Secure and SameSite=Strict attributes on all Set-Cookie headers
  • Enforce HTTPS-only access using network-level controls and firewall rules to block HTTP traffic to PcVue services
  • Restrict access to PcVue web interfaces to internal networks only, minimizing exposure to external attack vectors
  • Implement additional authentication factors for PcVue web access to reduce impact of potential session compromise
bash
# Example NGINX reverse proxy configuration to add cookie security attributes
# Add to location block serving PcVue web services
proxy_cookie_flags ~ secure samesite=strict;

# Alternatively, use header manipulation
proxy_hide_header Set-Cookie;
add_header Set-Cookie $sent_http_set_cookie;
more_set_headers -s 200 "Set-Cookie: $sent_http_set_cookie; Secure; SameSite=Strict";

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechPcvue

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:M/U:Clear
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • CWE References
  • CWE-614
  • Technical References
  • PCVue Security Bulletin SB2026-2
  • Related CVEs
  • CVE-2026-1695: PcVue OAuth Services XSS Vulnerability

  • CVE-2026-1698: PcVue WebClient & WebScheduler RCE Flaw

  • CVE-2026-1694: PcVue Information Disclosure Vulnerability

  • CVE-2026-1693: PcVue Authentication Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English