Lucene search

K
cve[email protected]CVE-2023-4346
HistoryAug 29, 2023 - 8:15 p.m.

CVE-2023-4346

2023-08-2920:15:10
CWE-645
web.nvd.nist.gov
18
cve-2023-4346
knx devices
connection authorization
unauthorized access
lockout
bcu key
network interface
physical access

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

KNX devices that use KNX Connection Authorization and support Option 1 are, depending on the implementation, vulnerable to being locked and users being unable to reset them to gain access to the device. The BCU key feature on the devices can be used to create a password for the device, but this password can often not be reset without entering the current password. If the device is configured to interface with a network, an attacker with access to that network could interface with the KNX installation, purge all devices without additional security options enabled, and set a BCU key, locking the device. Even if a device is not connected to a network, an attacker with physical access to the device could also exploit this vulnerability in the same way.

Affected configurations

NVD
Node
knxconnection_authorizationMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "KNX Protocol Connection Authorization Option 1",
    "vendor": "KNX Association",
    "versions": [
      {
        "status": "affected",
        "version": "0"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.1%

Related for CVE-2023-4346