Vulnerability identifier: #VU71171
Vulnerability risk: High
CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-306
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Nova 220 (EYK220F001) DDC with BACnet connection
Hardware solutions /
Other hardware appliances
Nova 230 (EYK230F001) DDC with BACnet connection
Hardware solutions /
Other hardware appliances
Nova 106 (EYK300F001) BACnet communication card
Hardware solutions /
Other hardware appliances
moduNet300 (EY-AM300F001)
Hardware solutions /
Other hardware appliances
moduNet300 (EY-AM300F002)
Hardware solutions /
Other hardware appliances
Vendor: Fr. Sauter AG
Description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to missing authentication for critical function within the affected software with BACnetstac version 4.2.1 and prior. A remote attacker can access the system and modify the device configuration, leading to arbitrary commands execution.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
Nova 220 (EYK220F001) DDC with BACnet connection: 3.3-006
Nova 230 (EYK230F001) DDC with BACnet connection: 3.3-006
Nova 106 (EYK300F001) BACnet communication card: 3.3-006
moduNet300 (EY-AM300F001): 3.3-006
moduNet300 (EY-AM300F002): 3.3-006
External links
http://ics-cert.us-cert.gov/advisories/icsa-22-012-05
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.