vendor:
                    Cylon FLXeon BACnet Controller
                by:
                    Zero Science Lab
                6.1
                        CVSS
                    HIGH
                    Unauthenticated WebSocket Command Execution
                    284
                        CWE
                    Product Name: Cylon FLXeon BACnet Controller
                    Affected Version From:  FLXeon Series (FBXi Series, FBTi Series, FBVi Series), CBX Series (FLX Series), CBT Series, CBV Series Firmware <=9.3.4
                    Affected Version To:  Not specified
                    Patch Exists: NO
                    Related CWE: CVE-2024-48849
                    CPE:  ABB:Cylon_FLXeon:9.3.4
                    Platforms Tested:  Linux
                    2024
                    ABB Cylon FLXeon 9.3.4 WebSocket Command Spawning Vulnerability
The ABB Cylon FLXeon BACnet controller is vulnerable to an unauthenticated WebSocket implementation that allows an attacker to execute the tcpdump command. By exploiting this vulnerability, an attacker can launch multiple instances of tcpdump, leading to resource exhaustion, denial of service (DoS) conditions, and potential data exfiltration. The lack of authentication on the WebSocket interface enables unauthorized users to continuously spawn new tcpdump processes, escalating the impact of the attack.
Mitigation:
					To mitigate this vulnerability, it is recommended to restrict access to the WebSocket interface, implement proper authentication mechanisms, and apply the latest firmware update provided by ABB to address this issue.