ABB Cylon FLXeon Vulnerability: When Smart Building Controllers Go Rogue!
The ABB Cylon FLXeon BACnet controller is like a party crasher that never gets caught! Thanks to its unauthenticated WebSocket feature, it allows any mischievous hacker to execute tcpdump commands, creating a network traffic jam. This vulnerability is the tech equivalent of leaving your front door wide open with a sign saying, “Come on in!”

Hot Take:
Who knew that ABB’s BACnet controllers could double as a free-for-all playground for hackers? With WebSocket vulnerabilities lurking like uninvited guests, it seems like ABB has left the doors wide open for a party no one wanted to host. Maybe they should’ve installed their own building management solutions to keep this under control!
Key Points:
- The ABB Cylon FLXeon BACnet controller is susceptible to unauthenticated WebSocket attacks.
- Hackers can execute the tcpdump command remotely, capturing network traffic and causing chaos.
- This vulnerability can lead to denial of service (DoS) and potential data exfiltration.
- The affected firmware version is 9.3.4 and below across multiple series.
- Discovered by Gjoko ‘LiquidWorm’ Krstic, the exploit showcases the dangers of unsecured WebSocket interfaces.
Already a member? Log in here