First published: Sun Jul 26 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Honeywell Tuxedo Touch | <=5.1.13.0_va |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2848 has a medium severity rating due to its potential impact on user authentication.
To fix CVE-2015-2848, upgrade Honeywell Tuxedo Touch to version 5.2.19.0_VA or later.
CVE-2015-2848 enables remote attackers to perform cross-site request forgery attacks to hijack user authentication.
Honeywell Tuxedo Touch versions prior to 5.2.19.0_VA are affected by CVE-2015-2848.
CVE-2015-2848 can be exploited to execute unauthorized home-automation commands, such as unlocking doors.