ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html | Third Party Advisory |
https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.8 |
25 Apr 2022, 17:59
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 |
07 Oct 2021, 18:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:* cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:* cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
References | (MISC) https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.html - Third Party Advisory |
30 Sep 2021, 11:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-30 11:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41292
Mitre link : CVE-2021-41292
CVE.ORG link : CVE-2021-41292
JSON object : View
Products Affected
ecoa
- riskterminator
- ecs_router_controller-ecs_firmware
- riskbuster
- riskbuster_firmware
- ecs_router_controller-ecs