The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
2021-09-27T14:15:07.957
2024-11-21T05:49:49.460
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:C/A:C
8.6
9.5
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | abb | mybuildings | < 2021-05-03 | Yes |
Application | busch-jaeger | mybusch-jaeger | < 2021-05-03 | Yes |