ICS/OT

Building Automation System Exploit Brings KNX Security Back in Spotlight 

A public exploit targeting building automation systems brings KNX security back into the spotlight, with Schneider Electric releasing a security bulletin.

Building automation system exploit

A public exploit targeting building automation systems has brought KNX security back into the spotlight, with industrial giant Schneider Electric releasing a security bulletin to warn customers about the potential risks.

KNX is a widely used open standard for commercial and residential building automation. It can be used to control security systems, lighting, HVAC, energy management, and many other smart building systems.

Its developers warned in 2021 that smart building installations, including ones based on KNX, had been increasingly targeted in attacks. 

In one attack reported at the time, aimed at a German engineering company, hackers had taken control of internet-exposed building automation devices and locked the victim’s employees out of the system. For unclear reasons, the attackers had bricked hundreds of automation control devices, causing the building to lose all of its smart functionality. 

In a security bulletin published late last month, Schneider Electric notified customers that it had become aware of the public availability of an exploit targeting KNX home and building automation systems. 

The PoC exploit that Schneider is warning about, published in March, targets the company’s SpaceLynk and Wiser for KNX (formerly HomeLynk) products. However, the French industrial giant said its FellerLynk products are impacted as well. 

The exploit targets two known vulnerabilities: one addressed by the vendor in February 2022 (CVE-2022-22809) and one addressed in August 2020 (CVE-2020-7525). 

Threat actors could use the vulnerabilities to access admin functionality without a password through a directory traversal, or access the administration panel through a brute-force attack. 

The hacker who made public this exploit recently also published PoCs targeting fueling systems. 

Advertisement. Scroll to continue reading.

Schneider issued a warning over KNX attacks back in 2021 and now says “this new exploit brings further attention to the recommended mitigations in that security bulletin”.

There do not appear to be any new reports about these or other KNX vulnerabilities being exploited in the wild. However, Schneider warned that it’s aware of some end-users exposing old and unpatched versions of its products to the internet.

The company has provided recommendations on how customers can prevent attacks. Those who believe their KNX system has been compromised have been urged to contact its customer care center. 

Learn More at SecurityWeek’s ICS Cyber Security Conference
The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

October 23-26, 2023 | Atlanta
www.icscybersecurityconference.com

Related: Critical Siemens RTU Vulnerability Could Allow Hackers to Destabilize Power Grid

Related: New Data Sharing Platform Serves as Early Warning System for OT Security Threats

Related: Critical Flaw in Inea ICS Product Exposes Industrial Organizations to Remote Attacks

Related Content

Ransomware

Cactus ransomware has added Schneider Electric to its leak site, claiming to have stolen 1.5 terabytes of data.

Ransomware

Schneider Electric’s Sustainability Business division disrupted as a result of a ransomware attack and data breach. 

ICS/OT

Ransomware attacks aimed at industrial organizations are increasingly impacting OT systems, according to a Claroty report.

ICS/OT

The Dragos Community Defense Program is offering free OT cybersecurity software to small electric, water, and natural gas utilities in the US. 

ICS/OT

Forescout has found 21 vulnerabilities in Sierra Wireless OT/IoT routers that could expose critical infrastructure organizations to remote attacks. 

Cyberwarfare

Security agencies say the Cyber Av3ngers group targeting ICS at multiple water facilities is affiliated with the Iranian government.

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

Palo Alto Networks has launched a new rugged firewall for industrial environments and announced several OT security improvements.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version