Skip to content

Replay Attack in ABB, Busch-Jaeger, FTS Display (version...

Critical severity Unreviewed Published Jun 5, 2024 to the GitHub Advisory Database • Updated Mar 27, 2025

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Replay Attack

in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System

References

Published by the National Vulnerability Database Jun 5, 2024
Published to the GitHub Advisory Database Jun 5, 2024
Last updated Mar 27, 2025

Severity

Critical

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(27th percentile)

Weaknesses

Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). Learn more on MITRE.

CVE ID

CVE-2024-4009

GHSA ID

GHSA-48fj-hh68-6w6q

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.