Overview
All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery (CSRF).
Description
CWE-603: Use of Client-Side Authentication - CVE-2015-2847 The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page. By intercepting and dropping requests containing the string USERACCT=USERNAME:_,PASSWORD:_, an unauthenticated user may bypass authentication and access restricted pages. |
Impact
A remote, unauthenticated attacker may be able to bypass authentication checks to view restricted pages, or trick an authenticated user into making an unintentional request to the web server which will be treated as an authentic request. Compromised Tuxedo Touch Controllers may be leveraged to operate home automation devices, such as unlocking or locking doors. |
Solution
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6.8 | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Temporal | 5.3 | E:POC/RL:OF/RC:C |
Environmental | 1.8 | CDP:LM/TD:L/CR:ND/IR:H/AR:ND |
References
Acknowledgements
Thanks to Maxim Rupp for reporting this vulnerability.
This document was written by Joel Land.
Other Information
CVE IDs: | CVE-2015-2847, CVE-2015-2848 |
Date Public: | 2015-07-24 |
Date First Published: | 2015-07-24 |
Date Last Updated: | 2017-03-22 13:43 UTC |
Document Revision: | 21 |