CVE-2021-41291

7.5 HIGH

📋 TL;DR

CVE-2021-41291 is a path traversal vulnerability in ECOA BAS controllers that allows unauthenticated attackers to remotely disclose directory contents via the File Manager's GET parameter. This affects building automation systems using vulnerable ECOA controllers, potentially exposing sensitive configuration files and system information.

💻 Affected Systems

Products:
  • ECOA BAS controllers
Versions: Specific versions not detailed in references, but appears to affect multiple versions
Operating Systems: Embedded/controller OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects File Manager functionality in ECOA BAS controllers; requires the File Manager component to be accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the entire filesystem, locate and exfiltrate sensitive configuration files, credentials, or proprietary data, potentially enabling further attacks or system compromise.

🟠

Likely Case

Unauthenticated attackers scanning for vulnerable systems could enumerate directory structures and access readable files, exposing system information and configuration details.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to information disclosure within the segmented network zone.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple path traversal via GET parameter manipulation; no authentication required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-5127-3cbd3-1.html

Restart Required: Yes

Instructions:

1. Contact ECOA for specific patch information. 2. Apply vendor-provided firmware updates. 3. Restart affected controllers after patching.

🔧 Temporary Workarounds

Network segmentation and access control

all

Restrict network access to BAS controllers to only authorized management systems

Disable File Manager remote access

all

Configure controllers to disable remote File Manager access if not required

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BAS controllers from untrusted networks
  • Deploy web application firewalls (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Test if directory traversal is possible via File Manager GET parameter (e.g., attempt to access parent directories)

Check Version:

Check controller firmware version via management interface or vendor tools

Verify Fix Applied:

Verify patch version and retest path traversal attempts; ensure they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual GET requests with path traversal patterns (../, ..\) to File Manager endpoints
  • Multiple failed directory traversal attempts

Network Indicators:

  • HTTP requests containing path traversal sequences to BAS controller IPs
  • Unusual traffic patterns to BAS controller File Manager endpoints

SIEM Query:

source_ip="*" AND http_uri CONTAINS "../" AND destination_ip IN [BAS_controller_ips]

🔗 References

📤 Share & Export