CVE-2021-36799
📋 TL;DR
CVE-2021-36799 is a hard-coded credential vulnerability in KNX ETS5 software versions through 5.7.6. It allows local users to decrypt and read project information using the known password 'ETS5Password' with salt 'Ivan Medvedev'. This affects organizations using unsupported ETS5 versions for building automation projects.
💻 Affected Systems
- KNX ETS5 Professional
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers with local access could extract sensitive building automation configurations, security keys, and project details, potentially enabling physical security bypass or system manipulation.
Likely Case
Local users or malware could access and exfiltrate KNX project files containing building automation logic and device configurations.
If Mitigated
With proper access controls and updated software, only authorized users can access project files, maintaining confidentiality of building automation systems.
🎯 Exploit Status
Password recovery tools are publicly available that demonstrate exploitation. Requires local access to the system running ETS5.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://www.knx.org/knx-en/for-professionals/software/ets-5-professional/
Restart Required: No
Instructions:
Upgrade to supported ETS6 version. No patch available for ETS5 as it is end-of-life.
🔧 Temporary Workarounds
Restrict Local Access
allLimit physical and remote access to systems running ETS5 software to authorized personnel only.
File System Permissions
windowsSet strict file permissions on ETS5 project directories to prevent unauthorized access.
icacls "C:\Program Files\ETS5\Projects" /deny Users:(OI)(CI)F
icacls "C:\Users\%USERNAME%\Documents\ETS5 Projects" /deny Users:(OI)(CI)F
🧯 If You Can't Patch
- Migrate projects to supported ETS6 version and decommission ETS5 installations.
- Implement strict access controls and monitoring on systems running ETS5 software.
🔍 How to Verify
Check if Vulnerable:
Check ETS5 version in Help > About. If version is 5.7.6 or earlier, system is vulnerable.
Check Version:
Open ETS5 and navigate to Help > About menu
Verify Fix Applied:
Verify ETS5 is uninstalled and replaced with ETS6. Check that project files are no longer accessible to unauthorized users.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to ETS5 project directories
- Execution of known password recovery tools like ets5-password-recovery
Network Indicators:
- Unusual file transfers of .knxproj files from ETS5 systems
SIEM Query:
Process creation where command_line contains 'ets5-password-recovery' OR file_access where file_path contains '.knxproj' AND user not in authorized_users
🔗 References
- http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html
- https://github.com/robertguetzkow/ets5-password-recovery
- https://www.knx.org/knx-en/for-professionals/software/ets-5-professional/
- http://packetstormsecurity.com/files/165200/ETS5-Password-Recovery-Tool.html
- https://github.com/robertguetzkow/ets5-password-recovery
- https://www.knx.org/knx-en/for-professionals/software/ets-5-professional/