CVE-2024-13967: CWE-384 Session Fixation in ABB EIBPORT V3 KNX
This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.
AI Analysis
Technical Summary
CVE-2024-13967 is a critical security vulnerability identified in ABB's EIBPORT V3 KNX devices, specifically affecting firmware versions up to 3.9.8 for both the standard and GSM variants. The vulnerability is classified under CWE-384, which corresponds to session fixation issues. Session fixation vulnerabilities occur when an attacker can fixate or set a user's session identifier (session ID) before the user logs in, enabling the attacker to hijack the authenticated session once the user logs in. In this case, the vulnerability allows an attacker to gain unauthorized access to the configuration web page hosted by the integrated web server on the EIBPORT device. The EIBPORT V3 KNX is a gateway device used in building automation systems to interface KNX installations with IP networks, enabling remote configuration and control of building automation components such as lighting, HVAC, and security systems. The CVSS 4.0 base score of 9.4 (critical) reflects the high severity of this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), and the scope is changed (S:H), indicating that exploitation affects components beyond the vulnerable component itself. The vulnerability does not currently have known exploits in the wild, but the potential for exploitation is significant given the critical nature of the device in building automation environments. Successful exploitation would allow attackers to bypass authentication mechanisms by fixing the session ID, thereby gaining unauthorized administrative access to the device's configuration interface. This could lead to manipulation of building automation settings, disruption of services, or further lateral movement within the network.
Potential Impact
For European organizations, especially those in sectors relying heavily on building automation such as commercial real estate, manufacturing, healthcare, and critical infrastructure, this vulnerability poses a significant risk. Unauthorized access to EIBPORT V3 KNX devices could allow attackers to alter building control systems, potentially causing operational disruptions, safety hazards, or privacy violations. Given the widespread adoption of ABB's automation products in Europe, exploitation could lead to large-scale impacts including denial of service of building systems, unauthorized surveillance, or sabotage. The criticality is heightened in environments where building automation is integrated with security systems or critical operational technology (OT) networks. Additionally, the vulnerability could be leveraged as a foothold for further network compromise, threatening broader organizational IT and OT assets. The requirement for user interaction may limit automated exploitation but does not eliminate risk, especially in environments where users access device management interfaces regularly. The lack of known exploits in the wild suggests that proactive mitigation is essential to prevent future attacks.
Mitigation Recommendations
1. Immediate firmware update: Organizations should monitor ABB's official channels for patches addressing CVE-2024-13967 and apply them promptly once available. 2. Network segmentation: Isolate EIBPORT devices on dedicated network segments with strict access controls to limit exposure to untrusted networks and reduce attack surface. 3. Access control hardening: Restrict access to the configuration web interface to trusted IP addresses and implement strong authentication mechanisms where possible. 4. Session management review: Where feasible, configure devices or intermediary systems to enforce secure session management practices, such as regenerating session IDs upon login and setting appropriate session timeouts. 5. Monitor and log access: Enable detailed logging of access to EIBPORT devices and monitor for suspicious activities indicative of session fixation or unauthorized access attempts. 6. User awareness: Educate users who interact with these devices about the risks of session fixation and encourage cautious behavior regarding session handling and authentication workflows. 7. Network intrusion detection: Deploy IDS/IPS solutions capable of detecting anomalous web session behaviors targeting these devices. 8. Temporary mitigations: Until patches are available, consider disabling remote web access to the EIBPORT devices if operationally feasible, or use VPNs with multi-factor authentication to secure remote access.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Switzerland, Belgium, Sweden
CVE-2024-13967: CWE-384 Session Fixation in ABB EIBPORT V3 KNX
Description
This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.
AI-Powered Analysis
Technical Analysis
CVE-2024-13967 is a critical security vulnerability identified in ABB's EIBPORT V3 KNX devices, specifically affecting firmware versions up to 3.9.8 for both the standard and GSM variants. The vulnerability is classified under CWE-384, which corresponds to session fixation issues. Session fixation vulnerabilities occur when an attacker can fixate or set a user's session identifier (session ID) before the user logs in, enabling the attacker to hijack the authenticated session once the user logs in. In this case, the vulnerability allows an attacker to gain unauthorized access to the configuration web page hosted by the integrated web server on the EIBPORT device. The EIBPORT V3 KNX is a gateway device used in building automation systems to interface KNX installations with IP networks, enabling remote configuration and control of building automation components such as lighting, HVAC, and security systems. The CVSS 4.0 base score of 9.4 (critical) reflects the high severity of this vulnerability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:A). The vulnerability impacts confidentiality, integrity, and availability at a high level (VC:H, VI:H, VA:H), and the scope is changed (S:H), indicating that exploitation affects components beyond the vulnerable component itself. The vulnerability does not currently have known exploits in the wild, but the potential for exploitation is significant given the critical nature of the device in building automation environments. Successful exploitation would allow attackers to bypass authentication mechanisms by fixing the session ID, thereby gaining unauthorized administrative access to the device's configuration interface. This could lead to manipulation of building automation settings, disruption of services, or further lateral movement within the network.
Potential Impact
For European organizations, especially those in sectors relying heavily on building automation such as commercial real estate, manufacturing, healthcare, and critical infrastructure, this vulnerability poses a significant risk. Unauthorized access to EIBPORT V3 KNX devices could allow attackers to alter building control systems, potentially causing operational disruptions, safety hazards, or privacy violations. Given the widespread adoption of ABB's automation products in Europe, exploitation could lead to large-scale impacts including denial of service of building systems, unauthorized surveillance, or sabotage. The criticality is heightened in environments where building automation is integrated with security systems or critical operational technology (OT) networks. Additionally, the vulnerability could be leveraged as a foothold for further network compromise, threatening broader organizational IT and OT assets. The requirement for user interaction may limit automated exploitation but does not eliminate risk, especially in environments where users access device management interfaces regularly. The lack of known exploits in the wild suggests that proactive mitigation is essential to prevent future attacks.
Mitigation Recommendations
1. Immediate firmware update: Organizations should monitor ABB's official channels for patches addressing CVE-2024-13967 and apply them promptly once available. 2. Network segmentation: Isolate EIBPORT devices on dedicated network segments with strict access controls to limit exposure to untrusted networks and reduce attack surface. 3. Access control hardening: Restrict access to the configuration web interface to trusted IP addresses and implement strong authentication mechanisms where possible. 4. Session management review: Where feasible, configure devices or intermediary systems to enforce secure session management practices, such as regenerating session IDs upon login and setting appropriate session timeouts. 5. Monitor and log access: Enable detailed logging of access to EIBPORT devices and monitor for suspicious activities indicative of session fixation or unauthorized access attempts. 6. User awareness: Educate users who interact with these devices about the risks of session fixation and encourage cautious behavior regarding session handling and authentication workflows. 7. Network intrusion detection: Deploy IDS/IPS solutions capable of detecting anomalous web session behaviors targeting these devices. 8. Temporary mitigations: Until patches are available, consider disabling remote web access to the EIBPORT devices if operationally feasible, or use VPNs with multi-factor authentication to secure remote access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ABB
- Date Reserved
- 2025-06-04T07:03:43.612Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6840003b182aa0cae2a406b9
Added to database: 6/4/2025, 8:13:47 AM
Last enriched: 7/5/2025, 11:40:28 PM
Last updated: 7/30/2025, 4:12:44 PM
Views: 13
Related Threats
CVE-2025-8964: Improper Authentication in code-projects Hostel Management System
MediumCVE-2025-7971: CWE-20: Improper Input Validation in Rockwell Automation Studio 5000 Logix Designer®
HighCVE-2025-40758: CWE-347: Improper Verification of Cryptographic Signature in Siemens Mendix SAML (Mendix 10.12 compatible)
HighCVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.