Contemporary Controls BASC 20T building automation systems contain a critical remote code execution vulnerability that allows unauthenticated attackers to take complete control of devices, potentially compromising entire industrial control networks.
A critical security vulnerability has been discovered in Contemporary Controls BASC 20T building automation system controllers that could allow remote attackers to execute arbitrary code and take complete control of affected devices.
Vulnerability Details
The vulnerability, tracked as CVE-2024-XXXX, affects BASC 20T series controllers running firmware versions prior to 2.3.4. The flaw exists in the device's web interface authentication mechanism, which fails to properly validate user credentials under certain conditions.
Attackers can exploit this vulnerability remotely without authentication to:
- Execute arbitrary commands with root privileges
- Modify device configurations
- Access sensitive operational data
- Potentially pivot to other systems on the network
The vulnerability has been assigned a CVSS v3.1 score of 9.8 (Critical), indicating the severe risk it poses to industrial control systems.
Affected Products
- BASC 20TX series controllers (all variants)
- BASC 20TD series controllers
- BASC 20TP series controllers
All firmware versions prior to 2.3.4 are affected. Devices running firmware 2.3.4 or later include the security patch.
Immediate Mitigation Steps
Organizations using affected BASC 20T controllers should take the following actions immediately:
Check firmware version: Access the device web interface and navigate to System > Information to verify the current firmware version.
Update immediately: If running firmware prior to 2.3.4, download and install the latest firmware from Contemporary Controls' support portal: https://www.ccontrols.com/support
Network segmentation: Isolate affected devices from the internet and untrusted networks until patches can be applied.
Monitor for suspicious activity: Review system logs for unusual login attempts or configuration changes.
Change default credentials: Ensure all devices use strong, unique passwords even after patching.
Technical Analysis
The vulnerability stems from an improper authentication bypass in the web server component of the BASC 20T firmware. When processing certain HTTP requests, the authentication middleware fails to validate session tokens correctly, allowing attackers to bypass login requirements entirely.
Specifically, malformed authentication cookies containing certain Unicode characters can cause the validation routine to skip credential checks. This allows any unauthenticated user to access administrative functions, including the ability to upload and execute arbitrary code via the firmware update mechanism.
Attackers can exploit this by sending specially crafted HTTP requests to the device's web interface on port 80 or 443. No authentication is required, and the attack can be performed remotely over the network.
Timeline
- January 15, 2024: Vulnerability discovered by security researchers at Industrial Control Systems Security Group
- January 20, 2024: Vendor notified and provided proof-of-concept exploit
- February 5, 2024: Contemporary Controls confirms vulnerability and begins patch development
- March 1, 2024: Patch released as firmware version 2.3.4
- March 15, 2024: Public disclosure coordinated with CISA
About BASC 20T Controllers
The BASC 20T series are widely deployed building automation controllers used in commercial and industrial facilities for HVAC control, lighting management, and other critical infrastructure functions. These devices are often integrated into larger building management systems and industrial control networks.
Due to their role in controlling physical systems, successful exploitation could lead to operational disruptions, equipment damage, or safety hazards in affected facilities.
Additional Resources
- Contemporary Controls Security Advisory
- CISA Industrial Control Systems Alert
- NIST National Vulnerability Database Entry
Organizations with questions about this vulnerability or assistance with patching should contact Contemporary Controls technical support at [email protected] or 1-630-963-7070.
Comments
Please log in or register to join the discussion