First published: Wed Jun 05 2024(Updated: )
Replay Attack in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ABB 2TMA310010B0001 | <1.02 | |
ABB 2TMA310010B0001 | ||
All of | ||
Abb 2TMA310011B0001 | <1.02 | |
ABB 2TMA310011B0001 | ||
All of | ||
Abb 2tma310011b0002 | <1.02 | |
Abb 2tma310011b0002 | ||
All of | ||
Abb 2tma310010b0003 | <1.02 | |
Abb 2tma310010b0003 Firmware | ||
All of | ||
Abb 2tma310011b0003 | <1.02 | |
Abb 2tma310011b0003 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4009 is considered a critical vulnerability due to the potential for replay attacks on local KNX Bus-Systems.
To fix CVE-2024-4009, users should update the affected ABB firmware to versions higher than 1.02.
CVE-2024-4009 affects ABB firmware versions 1.00 for FTS Display and 1.3.0.33 for BCU.
Exploiting CVE-2024-4009 allows an attacker to capture and replay KNX telegrams, potentially compromising system operations.
CVE-2024-4009 specifically affects ABB 2TMA310010B0001, 2TMA310011B0001, 2TMA310011B0002, 2TMA310010B0003, and 2TMA310011B0003 products.