Unrated severityNVD Advisory· Published Sep 27, 2021· Updated Sep 16, 2024
ControlTouch Cloud Service vulnerability: Serial Number can be misused during commissioning phase.
CVE-2021-22272
Description
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
Affected products
1- Range: 2021-05-03
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- search.abb.com/library/Download.aspxmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.