CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
This vulnerability allows the successful attacker to gain unauthorized access to a configuration web page delivered by the integrated web Server of EIBPORT. This issue affects EIBPORT V3 KNX: through 3.9.8; EIBPORT V3 KNX GSM: through 3.9.8.
Analysis
CVE-2024-13967 is an authentication bypass vulnerability in EIBPORT V3 KNX web server that allows unauthenticated attackers to access sensitive configuration pages through the integrated web interface. Affects EIBPORT V3 KNX and EIBPORT V3 KNX GSM through version 3.9.8. Successful exploitation enables complete compromise of the device including confidentiality, integrity, and availability of configuration settings and potentially the entire KNX installation.
Technical Context
EIBPORT is a KNX gateway device with an integrated web server for remote configuration and management. The vulnerability resides in the web application layer (CWE-384: Improper Authentication) where the server fails to properly validate authentication credentials before granting access to administrative configuration interfaces. KNX (Konnex) is a European standard for building automation used in HVAC, lighting, and security systems. The affected products are: CPE:2.3:a:weinzierl:eibport_v3_knx:*:*:*:*:*:*:*:* (versions up to 3.9.8) and CPE:2.3:a:weinzierl:eibport_v3_knx_gsm:*:*:*:*:*:*:*:* (versions up to 3.9.8). The root cause is inadequate session management or missing authentication checks on protected configuration endpoints, allowing network-accessible exploitation without prior authentication.
Affected Products
EIBPORT V3 KNX (3.9.8 and earlier); EIBPORT V3 KNX GSM (3.9.8 and earlier)
Remediation
Upgrade EIBPORT V3 KNX to version 3.9.9 or later; priority: Critical Upgrade EIBPORT V3 KNX GSM to version 3.9.9 or later; priority: Critical Mitigation: Restrict network access to the EIBPORT web interface using firewall rules; allow only from trusted administrative networks Mitigation: Disable remote web access if not required; configure the device to accept web interface connections only from local/internal network segments Mitigation: Implement network segmentation to isolate KNX gateway devices from direct internet exposure Mitigation: Monitor web server logs for suspicious access attempts to configuration endpoints Detection: Check current firmware version in device administration panel; verify installed version is 3.9.9 or higher
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2024-54646