CVE-2021-39363

9.8 CRITICAL

📋 TL;DR

This vulnerability in Honeywell HDZP252DI and HBW2PER1 devices allows attackers to perform ARP cache poisoning, enabling video replay attacks. Attackers can intercept and replay video streams, compromising surveillance integrity. Organizations using these specific Honeywell security devices are affected.

💻 Affected Systems

Products:
  • Honeywell HDZP252DI
  • Honeywell HBW2PER1
Versions: HDZP252DI 1.00.HW02.4 and earlier, HBW2PER1 1.000.HW01.3 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are vulnerable in default configurations when connected to networks where ARP poisoning is possible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete surveillance system compromise with attackers intercepting, manipulating, and replaying video feeds while maintaining access to the network.

🟠

Likely Case

Video feed manipulation and replay enabling false evidence creation or surveillance evasion.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring detecting ARP anomalies.

🌐 Internet-Facing: HIGH if devices are directly internet-accessible, as ARP poisoning can be initiated remotely.
🏢 Internal Only: HIGH as attackers on the local network can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

ARP poisoning is a well-known technique, and video replay attacks are straightforward once ARP cache is poisoned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HDZP252DI: 1.00.HW02.5 or later, HBW2PER1: 1.000.HW01.4 or later

Vendor Advisory: https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-01_CVE-2021-39363_Command_Injection_HDZP252DI.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from Honeywell support portal. 2. Backup device configuration. 3. Apply firmware update via device web interface. 4. Reboot device. 5. Verify firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices on separate VLANs to limit ARP poisoning scope.

Static ARP Entries

linux

Configure static ARP entries for critical devices to prevent ARP cache poisoning.

arp -s <ip_address> <mac_address>

🧯 If You Can't Patch

  • Segment affected devices on isolated networks with strict access controls.
  • Implement network monitoring for ARP spoofing and anomalous traffic patterns.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface: System > Information > Firmware Version.

Check Version:

Not applicable - check via device web interface

Verify Fix Applied:

Confirm firmware version is HDZP252DI 1.00.HW02.5+ or HBW2PER1 1.000.HW01.4+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ARP traffic patterns
  • Multiple ARP requests from single source
  • ARP table inconsistencies

Network Indicators:

  • ARP packets with mismatched IP/MAC addresses
  • Unexpected video stream redirections
  • Duplicate IP addresses on network

SIEM Query:

source="network" AND (event_type="arp_spoof" OR arp.opcode=2 AND count()>10 per src_mac)

🔗 References

📤 Share & Export