ABB Cylon Aspect Vulnerability: When Your Building Management System Becomes an Unwanted Stand-Up Comedian

The ABB Cylon Aspect 3.08.02 system is so open, you could drive a bus through it! Thanks to a flaw in deployStart.php, even your grandma can initiate server madness with a single click—no experience required. So, buckle up and prepare for unauthorized server initialization and performance issues like never before!

Pro Dashboard

Hot Take:

ABB’s Cylon Aspect BMS/BAS controller is the new VIP at the hackers’ party, and it’s not even on the guest list! This unauthenticated command execution vulnerability is like leaving your front door wide open with a “Free Pizza Inside” sign—except instead of pizza, it’s your critical building management system data. Time to shut the door and fix the locks, ABB!

Key Points:

  • ABB Cylon Aspect has an unauthenticated command execution vulnerability.
  • The vulnerability is due to the deployStart.php script.
  • This allows unauthorized execution of ‘rundeploy.sh’, potentially causing server issues.
  • It affects multiple versions and hardware, including NEXUS and MATRIX-2 Series.
  • Discovered by Gjoko ‘LiquidWorm’ Krstic, it is recorded under CVE-2024-48840.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?