HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Critical Modbus Vulnerability (CVE‑2026‑4436) in GPL Odorizers GPL750 Endangers Gas Pipeline Operations

CISA has issued an advisory for CVE‑2026‑4436, a high‑severity flaw in GPL Odorizers GPL750 odorant injectors that allows low‑privileged remote attackers to manipulate odorant dosing via Modbus. The issue threatens pipeline safety, regulatory compliance, and third‑party risk for utilities and chemical manufacturers.

LiveThreat™ Intelligence · 📅 April 10, 2026· 📰 cisa.gov
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
6 recommended
📰
Source
cisa.gov

Critical Modbus Vulnerability (CVE‑2026‑4436) in GPL Odorizers GPL750 Endangers Gas Pipeline Operations

What It Is – A remote, low‑privileged attacker can send crafted Modbus packets to GPL Odorizers GPL750 odorant injectors and overwrite registers that control the amount of odorant added to natural‑gas pipelines. Manipulating these values can cause either under‑odorization (making leaks harder to detect) or over‑odorization (potentially damaging downstream equipment).

Exploitability – The vulnerability is publicly disclosed by CISA with a CVSS v3.1 base score of 8.6 (High). No public PoC is required; the attack works over standard Modbus/TCP, which is often left unauthenticated on legacy OT networks.

Affected Products – GPL Odorizers GPL750 series:

  • XL4 ≥ v1.0 < v6.0
  • XL4 Prime ≥ v4.0 < v6.0
  • XL7 ≥ v13.0 < v20.0
  • XL7 Prime ≥ v18.4 < v20.0

TPRM Impact

  • Supply‑chain risk: Companies that contract with pipeline operators or chemical manufacturers may inherit safety and compliance liabilities.
  • Operational disruption: Incorrect odorant levels can trigger false alarms, shut‑downs, or undetected leaks, leading to regulatory fines and reputational damage.
  • Regulatory exposure: Failure to maintain proper odorization can breach environmental and safety regulations in multiple jurisdictions.

Recommended Actions

  • Inventory all GPL Odorizers GPL750 devices across your ecosystem.
  • Apply vendor firmware: Update to the latest GPL750 software version that patches CVE‑2026‑4436.
  • Network segmentation: Isolate Modbus traffic to a dedicated VLAN and enforce strict ACLs; block external access.
  • Disable unauthenticated Modbus where possible or require TLS‑wrapped Modbus (Modbus TLS).
  • Monitor for anomalous register writes using OT‑specific IDS/IPS.
  • Engage the vendor for any additional hardening guidance and confirm patch rollout timelines.

Source: CISA Advisory – ICSA‑26‑099‑02

📰 Original Source
https://www.cisa.gov/news-events/ics-advisories/icsa-26-099-02

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.