Description
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
Published: 2021-09-27
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-9418 The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
History

No history.

Subscriptions

Abb Mybuildings
Busch-jaeger Mybusch-jaeger
cve-icon MITRE

Status: PUBLISHED

Assigner: ABB

Published:

Updated: 2024-09-16T19:30:00.538Z

Reserved: 2021-01-05T00:00:00.000Z

Link: CVE-2021-22272

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-09-27T14:15:07.957

Modified: 2024-11-21T05:49:49.460

Link: CVE-2021-22272

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses