CVE-2019-19106

9.1 CRITICAL

📋 TL;DR

CVE-2019-19106 is an access control vulnerability in ABB and Busch-Jaeger telephone gateway devices that allows unauthorized users to view and modify restricted data including user profiles and application settings. This affects organizations using ABB Telephone Gateway TG/S 3.2 or Busch-Jaeger 6186/11 Telefon-Gateway devices for building automation and telephony integration.

💻 Affected Systems

Products:
  • ABB Telephone Gateway TG/S 3.2
  • Busch-Jaeger 6186/11 Telefon-Gateway
Versions: TG/S 3.2
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices in default configuration; used in building automation systems for telephony integration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control over telephone gateway functions, potentially intercepting calls, modifying user permissions, disrupting building automation systems, and accessing sensitive configuration data.

🟠

Likely Case

Unauthorized users access and modify user profiles, application settings, and potentially disrupt telephony services within affected building automation systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with no access to critical systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated access to restricted functions, making exploitation straightforward once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: TG/S 3.2 with security update

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK107680A3921&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download security update from ABB portal. 2. Backup current configuration. 3. Apply update following vendor instructions. 4. Restart device. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate telephone gateway devices on separate VLAN with strict firewall rules limiting access to authorized management systems only.

Access Control Lists

all

Implement strict IP-based access controls allowing only authorized administrative systems to connect to gateway management interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Deploy network monitoring and intrusion detection specifically for gateway management traffic

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface or CLI; if running TG/S 3.2 without security updates, assume vulnerable.

Check Version:

Check via web interface at http://[device-ip]/status or consult device documentation for CLI version check.

Verify Fix Applied:

Verify updated version is installed and test that unauthorized users cannot access restricted management functions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to management interfaces
  • Configuration changes from unexpected IP addresses
  • Failed authentication attempts followed by successful restricted access

Network Indicators:

  • Unexpected HTTP/HTTPS traffic to gateway management ports from unauthorized sources
  • Traffic patterns indicating configuration changes

SIEM Query:

source_ip NOT IN (authorized_admin_ips) AND dest_port IN (80,443,8080) AND dest_ip IN (gateway_ips) AND (uri CONTAINS "/admin" OR uri CONTAINS "/config")

🔗 References

📤 Share & Export