Your one-stop web resource providing safety and security information to manufacturers

Honeywell released a new firmware version that mitigates vulnerabilities in its Tuxedo Touch Controller, according to report on US-CERT.

The controller is vulnerable to authentication bypass and cross-site request forgery (CSRF).

Chrysler Updates 1.4 Million Vehicles
Fiat Fixes Auto Remote Exploit
Siemens Fixes SIPROTEC DoS Vulnerability
Sm@rtClient Android Vulnerability Fixed

Honeywell released firmware version TUXW_V5.2.19.0_VA to address these vulnerabilities in the home automation system. Since all prior firmware versions suffer from the issue, users should update their devices. German researcher Maxim Rupp form Cure53 discovered the vulnerability.

The Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page. By intercepting and dropping requests containing the string USERACCT=USERNAME:_,PASSWORD:_, an unauthenticated user may bypass authentication and access restricted pages. The case number for the vulnerability is CVE-2015-2847.

Cyber Security

In addition, the Tuxedo Touch Controller contains a global cross-site request forgery (CSRF) vulnerability.

An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and falls for the trigger of a malicious request. Note that these actions may include issuing commands to home automation devices controlled by the Tuxedo Touch Controller, such as unlocking or locking doors. The case number for the vulnerability is CVE-2015-2848.

A remote, unauthenticated attacker may be able to bypass authentication checks to view restricted pages, or trick an authenticated user into making an unintentional request to the web server which will end up treated as an authentic request. Compromised Tuxedo Touch Controllers may end up leveraged to operate home automation devices, such as unlocking or locking doors.

Honeywell learned about the vulnerability on May 15 and updated it June 16.

Pin It on Pinterest

Share This