honeywell tuxedo touch controller

All versions of Honeywell Tuxedo Touch Controller are vulnerable to authentication bypass and cross-site request forgery (CSRF).

CVE-2015-2847 Authentication Bypass

The Honeywell Tuxedo Touch Controller web interface uses JavaScript to check for client authentication and redirect unauthorized users to a login page.

By intercepting and dropping requests containing the string USERACCT=USERNAME:_,PASSWORD:_, an unauthenticated user may bypass authentication and access restricted pages.

CVE-2015-2848 CSRF

Honeywell Tuxedo Touch Controller contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that these actions may include issuing commands to home automation devices controlled by the Tuxedo Touch Controller, such as unlocking or locking doors.

Mitigation

Honeywell has released firmware version TUXW_V5.2.19.0_VA to address these vulnerabilities. Since all prior firmware versions are affected, users are strongly encouraged to update their devices.

NO COMMENTS