ABB has disclosed a critical security vulnerability in its EIBPORT building automation controllers that could allow attackers to gain unauthorized access to sensitive configuration pages without authentication.
The vulnerability, identified as CVE-2024-13967, affects all EIBPORT V3 KNX and EIBPORT V3 KNX GSM devices running firmware versions 3.9.8 and earlier.
This session management failure vulnerability has received a high severity CVSS v3.1 base score of 8.8 and an even more concerning CVSS v4.0 score of 9.4.
The vulnerability stems from improper session management implementation in the EIBPORT devices, which are widely used in KNX-based building automation systems.
When exploited, the vulnerability allows attackers to bypass authentication mechanisms and access configuration web pages served by the integrated web server.
This session fixation vulnerability (CWE-384) could enable unauthorized users to view sensitive information stored on the device and modify critical configuration settings.
According to ABB’s security advisory released on June 4, 2025, successful exploitation requires user interaction but no privileges, making it particularly dangerous if the devices are accessible over networks.
While the vulnerability cannot be exploited remotely if proper security practices are followed, ABB discovered that some customers had exposed their EIBPORT devices directly to the internet against recommended deployment guidelines.
ABB EIBPORT Vulnerability
The vulnerability exists in the session management mechanism that fails to properly validate session tokens.
When examining the technical details, the vulnerability allows attackers to manipulate session identifiers to gain unauthorized administrative access to the device’s configuration interface.
Once access is gained, an attacker could potentially control building automation functions, extract sensitive network configuration data, or reconfigure the device for malicious purposes.
The severity rating reflects the potential impact on confidentiality, integrity, and availability of the building management system.
Although ABB states that functional safety cannot be affected by exploitation of this vulnerability, compromised building automation controls could still lead to significant operational disruptions in affected facilities.
Mitigations
ABB has released firmware version 3.9.9 that addresses the vulnerability by improving session management validation and hardening the product configuration.
The company strongly recommends that all customers update their EIBPORT devices to the latest firmware at their earliest convenience.
Security experts recommend additional protective measures, including:
- Isolating building automation networks behind firewalls
- Implementing physical access controls to prevent unauthorized device access
- Ensuring EIBPORT devices are not directly accessible from the internet
- Using secure methods such as VPNs when remote access is required
- Changing all default credentials during commissioning
The vulnerability was privately reported to ABB by security researchers, including one identified only as “Psytester.”
At the time of the advisory’s publication, ABB had not received any reports indicating that this vulnerability had been actively exploited in the wild.
For additional support with implementation of the firmware update, customers are advised to contact their local ABB service organization through the company’s official channels.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update