ID |
CVE-2021-22272
|
Sažetak |
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch |
Reference |
|
CVSS |
Base: | 9.0 |
Impact: | 9.5 |
Exploitability: | 8.6 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
COMPLETE |
COMPLETE |
|
CVSS vektor |
AV:N/AC:M/Au:N/C:P/I:C/A:C |
Zadnje važnije ažuriranje |
08-10-2021 - 14:16 |
Objavljeno |
27-09-2021 - 14:15 |