All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery (CSRF).
CWE-603: Use of Client-Side Authentication - CVE-2015-2847
CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-2848
Honeywell Tuxedo Touch Controller contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that these actions may include issuing commands to home automation devices controlled by the Tuxedo Touch Controller, such as unlocking or locking doors.
The CVSS score reflects CVE-2015-2848.
A remote, unauthenticated attacker may be able to bypass authentication checks to view restricted pages, or trick an authenticated user into making an unintentional request to the web server which will be treated as an authentic request. Compromised Tuxedo Touch Controllers may be leveraged to operate home automation devices, such as unlocking or locking doors.
Apply an update
Honeywell has released firmware version TUXW_V126.96.36.199_VA to address these vulnerabilities. Since all prior firmware versions are affected, users are strongly encouraged to update their devices.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Notified: May 15, 2015 Updated: June 16, 2015
Statement Date: June 15, 2015
No statement is currently available from the vendor regarding this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
All versions of Tuxedo Touch Controller prior to TUXW_V188.8.131.52_VA are affected.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal | 5.3 | E:POC/RL:OF/RC:C
Environmental | 1.8 | CDP:LM/TD:L/CR:ND/IR:H/AR:ND
Thanks to Maxim Rupp for reporting this vulnerability.
This document was written by Joel Land.