vendor:
Cylon FLXeon BACnet Controller
by:
Gjoko 'LiquidWorm' Krstic
6.1
CVSS
HIGH
Remote Code Execution (RCE)
78
CWE
Product Name: Cylon FLXeon BACnet Controller
Affected Version From: FLXeon Series (FBXi Series, FBTi Series, FBVi Series), CBX Series (FLX Series), CBT Series, CBV Series Firmware: <=9.3.4
Affected Version To: FLXeon Series (FBXi Series, FBTi Series, FBVi Series), CBX Series (FLX Series), CBT Series, CBV Series Firmware: 9.3.4
Patch Exists: YES
Related CWE: CVE-2024-48841
CPE: h:abb:ltd.:cylon_flxeon:9.3.4
Platforms Tested: Linux
2024
ABB Cylon FLXeon 9.3.4 – Remote Code Execution (RCE)
The ABB Cylon FLXeon BACnet controller is vulnerable to authenticated remote root code execution via the /api/users/password endpoint. An attacker with valid credentials can inject arbitrary system commands by manipulating the newPassword PUT parameter. This vulnerability allows for out-of-band (blind) command injection due to improper hashing and escaping of the new password in the users.js file, which is then passed to ChildProcess.exec() within a usermod command.
Mitigation:
To mitigate this vulnerability, users are advised to update the firmware of ABB Cylon FLXeon controllers to version 9.3.5 or higher. Additionally, restrict access to the /api/users/password endpoint and implement proper input validation and sanitization.