KNX Protocol
KNX devices using Connection Authorization Option 1 Style without a BCU Key set can be exploited by attackers with network access to lock out legitimate users. Once access is restricted, there is no built-in recovery mechanism to restore user access to the device. This affects all versions of susceptible KNX devices, and no firmware patch is available from the vendor. The vulnerability has been observed in active exploitation. The only protective measure is to set a BCU Key during project configuration before deployment and to isolate KNX networks from Internet and untrusted network access.
- Network access to the KNX device
- KNX device using Connection Authorization Option 1 Style
- No BCU Key currently set on the target device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d6c5ef81-90c3-4cdb-98c4-485b68a1767eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.