vendor:
Cylon FLXeon BACnet Controller
by:
Zero Science Lab
6.1
CVSS
HIGH
Unauthenticated WebSocket Command Execution
284
CWE
Product Name: Cylon FLXeon BACnet Controller
Affected Version From: FLXeon Series (FBXi Series, FBTi Series, FBVi Series), CBX Series (FLX Series), CBT Series, CBV Series Firmware <=9.3.4
Affected Version To: Not specified
Patch Exists: NO
Related CWE: CVE-2024-48849
CPE: ABB:Cylon_FLXeon:9.3.4
Platforms Tested: Linux
2024
ABB Cylon FLXeon 9.3.4 WebSocket Command Spawning Vulnerability
The ABB Cylon FLXeon BACnet controller is vulnerable to an unauthenticated WebSocket implementation that allows an attacker to execute the tcpdump command. By exploiting this vulnerability, an attacker can launch multiple instances of tcpdump, leading to resource exhaustion, denial of service (DoS) conditions, and potential data exfiltration. The lack of authentication on the WebSocket interface enables unauthorized users to continuously spawn new tcpdump processes, escalating the impact of the attack.
Mitigation:
To mitigate this vulnerability, it is recommended to restrict access to the WebSocket interface, implement proper authentication mechanisms, and apply the latest firmware update provided by ABB to address this issue.