The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.
Fixes

Solution

Affected users should contact a Trane representative to install updated firmware or request additional information. Please reference Trane service database number HUB-205962 when contacting the Trane office. Trane has identified the following specific mitigations: Symbio 700 controllers: Upgrade to v1.00.0023 or later Symbio 800 controllers: Upgrade to v1.00.0007 or later In addition to the specific recommendations above, Trane continues to recommend the following best practices as an additional protection against this and other controller vulnerabilities: Restrict physical controller access to trained and trusted personnel. Use secure remote access solutions, such as Trane Connect Remote Access, when needed. Ensure user credentials are not shared and follow best practices for appropriate complexity (e.g., strong passwords). Have a well-documented process and owner to ensure regular software/firmware updates and keep systems up to date.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-08-04T01:44:22.375Z

Reserved: 2021-08-10T00:00:00

Link: CVE-2021-38448

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-11-22T19:15:07.907

Modified: 2024-11-21T06:17:07.353

Link: CVE-2021-38448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.