First published: Thu Sep 23 2021(Updated: )
The vulnerability allows a successful attacker to bypass the integrity check of FW uploaded to the free@home System Access Point.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Abb System Access Point 2.0 Firmware | <2.6.4 | |
Abb System Access Point 2.0 | ||
Abb System Access Point 127v Firmware | <2.6.4 | |
Abb System Access Point 127v | ||
Abb Wl-system Access Point 127v Firmware | <2.6.4 | |
Abb Wl-system Access Point 127v | ||
Abb Wl-system Access Point Firmware | <2.6.4 | |
Abb Wl-system Access Point | ||
Abb Wl-system Access Point 2.0 Firmware | <2.6.4 | |
Abb Wl-system Access Point 2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22276 is medium with a severity value of 5.5.
The Abb System Access Point 2.0 Firmware and Abb System Access Point 127v Firmware up to version 2.6.4 are affected by CVE-2021-22276.
An attacker can exploit CVE-2021-22276 by bypassing the integrity check of firmware uploaded to the free@home System Access Point.
To fix CVE-2021-22276, it is recommended to apply the latest firmware update provided by Abb.
More information about CVE-2021-22276 can be found at the following link: [https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A6475&LanguageCode=en&DocumentPartId=&Action=Launch](https://search.abb.com/library/Download.aspx?DocumentID=9AKK107992A6475&LanguageCode=en&DocumentPartId=&Action=Launch)