Lucene search

K
cve[email protected]CVE-2021-22272
HistorySep 27, 2021 - 2:15 p.m.

CVE-2021-22272

2021-09-2714:15:07
CWE-200
web.nvd.nist.gov
17
cve
2021
22272
vulnerability
controltouch
commissioning process
unauthorized access
abb
busch-jaeger

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:P/I:C/A:C

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.6%

The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch

Affected configurations

NVD
Node
abbmybuildingsRange<2021-05-03
OR
busch-jaegermybusch-jaegerRange<2021-05-03

CNA Affected

[
  {
    "platforms": [
      "virtual"
    ],
    "product": "mybuildings.abb.com",
    "vendor": "ABB",
    "versions": [
      {
        "lessThan": "2021-05-03",
        "status": "affected",
        "version": "2021-05-03",
        "versionType": "custom"
      }
    ]
  },
  {
    "platforms": [
      "virtual"
    ],
    "product": "my.busch-jaeger.de",
    "vendor": "Busch-Jaeger",
    "versions": [
      {
        "lessThan": "2021-05-03",
        "status": "affected",
        "version": "2021-05-03",
        "versionType": "custom"
      }
    ]
  }
]

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:P/I:C/A:C

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

42.6%

Related for CVE-2021-22272