CVE-2022-29735

8.8 HIGH

📋 TL;DR

Delta Controls enteliTOUCH building automation controllers have a cross-site request forgery (CSRF) vulnerability that allows attackers to execute arbitrary commands via crafted HTTP requests. This affects enteliTOUCH versions 3.40.3935, 3.40.3706, and 3.33.4005. Attackers can potentially take full control of affected building automation systems.

💻 Affected Systems

Products:
  • Delta Controls enteliTOUCH
Versions: 3.40.3935, 3.40.3706, 3.33.4005
Operating Systems: Embedded/Proprietary
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific firmware versions of enteliTOUCH building automation controllers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, manipulate building controls, disable security systems, or pivot to other network systems.

🟠

Likely Case

Unauthorized command execution leading to building system manipulation, data theft, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - HTTP-based vulnerability that can be exploited remotely if systems are exposed to the internet.
🏢 Internal Only: HIGH - Even internally, attackers with network access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafted HTTP requests can trigger command execution without authentication. Public vulnerability details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with Delta Controls for updated firmware

Vendor Advisory: https://www.deltacontrols.com/

Restart Required: Yes

Instructions:

1. Contact Delta Controls support for patched firmware. 2. Backup current configuration. 3. Apply firmware update via management interface. 4. Restart device. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate enteliTOUCH devices on separate VLANs with strict firewall rules.

Access Control

all

Implement strict network access controls to limit HTTP access to authorized IPs only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate enteliTOUCH devices from untrusted networks
  • Deploy web application firewall (WAF) with CSRF protection rules in front of devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or management console. If version matches affected list, device is vulnerable.

Check Version:

Check via web interface at http://[device-ip]/ or through management software

Verify Fix Applied:

Verify firmware version has been updated to a version not listed in affected versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to enteliTOUCH devices
  • Multiple failed authentication attempts followed by command execution patterns

Network Indicators:

  • HTTP requests with unusual parameters or command injection patterns to enteliTOUCH ports

SIEM Query:

source_ip="*" AND dest_ip="enteliTOUCH_IP" AND (http_method="POST" OR http_method="GET") AND (url_contains="command" OR url_contains="exec")

🔗 References

📤 Share & Export