Vulnerability Description
ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ecoa | Ecs Router Controller-Ecs Firmware | - |
| Ecoa | Ecs Router Controller-Ecs | - |
| Ecoa | Riskbuster Firmware | - |
| Ecoa | Riskbuster | - |
| Ecoa | Riskterminator | - |
Related Weaknesses (CWE)
References
- https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.htmlThird Party Advisory
- https://www.twcert.org.tw/tw/cp-132-5128-b075a-1.htmlThird Party Advisory
FAQ
What is CVE-2021-41292?
CVE-2021-41292 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and ...
How severe is CVE-2021-41292?
CVE-2021-41292 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-41292?
Check the references section above for vendor advisories and patch information. Affected products include: Ecoa Ecs Router Controller-Ecs Firmware, Ecoa Ecs Router Controller-Ecs, Ecoa Riskbuster Firmware, Ecoa Riskbuster, Ecoa Riskterminator.