CRITICAL · 9.8

CVE-2021-41292

ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and ...

Vulnerability Description

ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
EcoaEcs Router Controller-Ecs Firmware-
EcoaEcs Router Controller-Ecs-
EcoaRiskbuster Firmware-
EcoaRiskbuster-
EcoaRiskterminator-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2021-41292?

CVE-2021-41292 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and ...

How severe is CVE-2021-41292?

CVE-2021-41292 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2021-41292?

Check the references section above for vendor advisories and patch information. Affected products include: Ecoa Ecs Router Controller-Ecs Firmware, Ecoa Ecs Router Controller-Ecs, Ecoa Riskbuster Firmware, Ecoa Riskbuster, Ecoa Riskterminator.