CVE-2021-22272

Published Sep 27, 2021

Last updated 3 years ago

Overview

Description
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
Source
cybersecurity@ch.abb.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
9.4
Impact score
5.5
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
9
Impact score
9.5
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:P/I:C/A:C

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
cybersecurity@ch.abb.com
CWE-200

Social media

Hype score
Not currently trending

Configurations