Lucene search

K
certCERTVU:857948
HistoryJul 24, 2015 - 12:00 a.m.

Honeywell Tuxedo Touch Controller contains multiple vulnerabilities

2015-07-2400:00:00
www.kb.cert.org
20

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.5%

Overview

All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery (CSRF).

Description

CWE-603**: Use of Client-Side Authentication -**CVE-2015-2847

The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page. By intercepting and dropping requests containing the string USERACCT=USERNAME:,PASSWORD:, an unauthenticated user may bypass authentication and access restricted pages.

CWE-352**: Cross-Site Request Forgery (CSRF) -**CVE-2015-2848

Honeywell Tuxedo Touch Controller contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that these actions may include issuing commands to home automation devices controlled by the Tuxedo Touch Controller, such as unlocking or locking doors.

The CVSS score reflects CVE-2015-2848.


Impact

A remote, unauthenticated attacker may be able to bypass authentication checks to view restricted pages, or trick an authenticated user into making an unintentional request to the web server which will be treated as an authentic request. Compromised Tuxedo Touch Controllers may be leveraged to operate home automation devices, such as unlocking or locking doors.


Solution

Apply an update

Honeywell has released firmware version TUXW_V5.2.19.0_VA to address these vulnerabilities. Since all prior firmware versions are affected, users are strongly encouraged to update their devices.


Vendor Information

857948

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Honeywell __ Affected

Notified: May 15, 2015 Updated: June 16, 2015

Statement Date: June 15, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

All versions of Tuxedo Touch Controller prior to TUXW_V5.1.19.0_VA are affected.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23857948 Feedback>).

CVSS Metrics

Group Score Vector
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal 5.3 E:POC/RL:OF/RC:C
Environmental 1.8 CDP:LM/TD:L/CR:ND/IR:H/AR:ND

References

Acknowledgements

Thanks to Maxim Rupp for reporting this vulnerability.

This document was written by Joel Land.

Other Information

CVE IDs: CVE-2015-2847, CVE-2015-2848
Date Public: 2015-07-24 Date First Published:

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.5%

Related for VU:857948