CVE-2020-7233

9.8 CRITICAL

📋 TL;DR

KMS Controls BAC-A1616BC BACnet devices contain a hardcoded backdoor password 'snowman' in their authentication system. This allows attackers to bypass authentication and gain administrative access to building automation systems. Organizations using these specific BACnet devices for HVAC, lighting, or other building controls are affected.

💻 Affected Systems

Products:
  • KMS Controls BAC-A1616BC BACnet Controller
Versions: All versions containing BC_Logon.swf file with BACKDOOR_NAME variable
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of building automation systems, potentially manipulating HVAC, lighting, security systems, or causing physical damage to equipment through unauthorized control.

🟠

Likely Case

Unauthorized access to building management systems allowing surveillance of building operations, manipulation of environmental controls, or disruption of building services.

🟢

If Mitigated

Limited impact if devices are isolated on separate networks with strict access controls and monitoring, though the backdoor remains accessible to anyone with network access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The backdoor password is publicly documented and requires no special tools or skills to exploit - attackers simply need network access and knowledge of the password.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Contact KMS Controls for firmware updates or replacement options.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate BACnet devices on separate VLANs with strict firewall rules preventing external access

Access Control Lists

all

Implement strict network ACLs allowing only authorized BACnet traffic from trusted sources

🧯 If You Can't Patch

  • Physically disconnect affected devices from any network with internet connectivity
  • Implement 24/7 monitoring of BACnet traffic for authentication attempts using the 'snowman' password

🔍 How to Verify

Check if Vulnerable:

Examine BC_Logon.swf file on the device for BACKDOOR_NAME variable containing 'snowman' password, or attempt authentication using 'snowman' as password

Check Version:

Check device firmware version through BACnet interface or device management console

Verify Fix Applied:

Verify that authentication with 'snowman' password no longer works and that BACKDOOR_NAME variable has been removed or changed in BC_Logon.swf

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login with unusual timing
  • Multiple authentication attempts from single source

Network Indicators:

  • BACnet authentication packets containing 'snowman' string
  • Unusual BACnet traffic patterns or commands

SIEM Query:

source="bacnet_traffic" AND (password="snowman" OR auth_string="snowman")

🔗 References

📤 Share & Export