6.8
CVSSv2

CVE-2015-2848

Published: 26/07/2015 Updated: 27/07/2015
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch prior to 5.2.19.0_VA allows remote malicious users to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Vulnerable Product Search on Vulmon Subscribe to Product

honeywell tuxedo touch

Recent Articles

SOHOpeless: Security stains on Honeywell's Tuxedo home automator
The Register • Richard Chirgwin • 28 Jul 2015

I could have sworn I locked the house when I went to work this morning ...

Honeywell has issued an urgent firmware update for its three-year-old Tuxedo Touch home automation controller to patch vulnerabilities that could, among other things, let an attacker unlock users' deadlocks. This CERT advisory explains that without the firmware upgrade, all users are vulnerable to authentication bypass and cross-site request forgery. Following the standard how-to-make-things-insecure playbook, the security behemoth decided that customers' lives would be sadly incomplete if it di...