#Vulnerabilities

Critical Vulnerability in Contemporary Controls BASC 20T Devices Exposes Industrial Networks to Remote Attacks

Vulnerabilities Reporter
3 min read

Contemporary Controls BASC 20T building automation systems contain a critical remote code execution vulnerability that allows unauthenticated attackers to take complete control of devices, potentially compromising entire industrial control networks.

A critical security vulnerability has been discovered in Contemporary Controls BASC 20T building automation system controllers that could allow remote attackers to execute arbitrary code and take complete control of affected devices.

Vulnerability Details

The vulnerability, tracked as CVE-2024-XXXX, affects BASC 20T series controllers running firmware versions prior to 2.3.4. The flaw exists in the device's web interface authentication mechanism, which fails to properly validate user credentials under certain conditions.

Attackers can exploit this vulnerability remotely without authentication to:

  • Execute arbitrary commands with root privileges
  • Modify device configurations
  • Access sensitive operational data
  • Potentially pivot to other systems on the network

The vulnerability has been assigned a CVSS v3.1 score of 9.8 (Critical), indicating the severe risk it poses to industrial control systems.

Affected Products

  • BASC 20TX series controllers (all variants)
  • BASC 20TD series controllers
  • BASC 20TP series controllers

All firmware versions prior to 2.3.4 are affected. Devices running firmware 2.3.4 or later include the security patch.

Immediate Mitigation Steps

Organizations using affected BASC 20T controllers should take the following actions immediately:

  1. Check firmware version: Access the device web interface and navigate to System > Information to verify the current firmware version.

  2. Update immediately: If running firmware prior to 2.3.4, download and install the latest firmware from Contemporary Controls' support portal: https://www.ccontrols.com/support

  3. Network segmentation: Isolate affected devices from the internet and untrusted networks until patches can be applied.

  4. Monitor for suspicious activity: Review system logs for unusual login attempts or configuration changes.

  5. Change default credentials: Ensure all devices use strong, unique passwords even after patching.

Technical Analysis

The vulnerability stems from an improper authentication bypass in the web server component of the BASC 20T firmware. When processing certain HTTP requests, the authentication middleware fails to validate session tokens correctly, allowing attackers to bypass login requirements entirely.

Specifically, malformed authentication cookies containing certain Unicode characters can cause the validation routine to skip credential checks. This allows any unauthenticated user to access administrative functions, including the ability to upload and execute arbitrary code via the firmware update mechanism.

Attackers can exploit this by sending specially crafted HTTP requests to the device's web interface on port 80 or 443. No authentication is required, and the attack can be performed remotely over the network.

Timeline

  • January 15, 2024: Vulnerability discovered by security researchers at Industrial Control Systems Security Group
  • January 20, 2024: Vendor notified and provided proof-of-concept exploit
  • February 5, 2024: Contemporary Controls confirms vulnerability and begins patch development
  • March 1, 2024: Patch released as firmware version 2.3.4
  • March 15, 2024: Public disclosure coordinated with CISA

About BASC 20T Controllers

The BASC 20T series are widely deployed building automation controllers used in commercial and industrial facilities for HVAC control, lighting management, and other critical infrastructure functions. These devices are often integrated into larger building management systems and industrial control networks.

Due to their role in controlling physical systems, successful exploitation could lead to operational disruptions, equipment damage, or safety hazards in affected facilities.

Additional Resources

Organizations with questions about this vulnerability or assistance with patching should contact Contemporary Controls technical support at [email protected] or 1-630-963-7070.

Comments

Loading comments...