|
|||
Rule General Information |
---|
Release Date: | 2024-10-29 | |
Rule Name: | ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Command Injection Vulnerability | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | ASPECT is an award-winning scalable building energy management and control solution designed to allow users seamless access to their building data through standard building protocols including smart devices. The ABB BMS/BAS controller suffers from an unauthenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the 'directory' HTTP POST parameter called by the persistenceManagerAjax.php script. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | ||
Solutions |
---|
Please contact the software vendor to update the software patch. |