CVE-2023-4346

Description

KNX devices that use KNX Connection Authorization and support Option 1 are, depending on the implementation, vulnerable to being locked and users being unable to reset them to gain access to the device. The BCU key feature on the devices can be used to create a password for the device, but this password can often not be reset without entering the current password. If the device is configured to interface with a network, an attacker with access to that network could interface with the KNX installation, purge all devices without additional security options enabled, and set a BCU key, locking the device. Even if a device is not connected to a network, an attacker with physical access to the device could also exploit this vulnerability in the same way.

Remediation

Workaround:

  • The KNX Association recommends users always set the BCU Key in every KNX Project that is already finished and will be commissioned in the future. Handover the BCU Key as part of the Project Documentation to the Building Owner.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.05%
Third-Party Advisory cisa.gov
Affected: KNX Association KNX Protocol Connection Authorization Option 1
Published at:
Updated at:

References

Link Tags
https://www.cisa.gov/news-events/ics-advisories/icsa-23-236-01 government resource third party advisory us government resource

Frequently Asked Questions

What is the severity of CVE-2023-4346?
CVE-2023-4346 has been scored as a high severity vulnerability.
How to fix CVE-2023-4346?
As a workaround for remediating CVE-2023-4346: The KNX Association recommends users always set the BCU Key in every KNX Project that is already finished and will be commissioned in the future. Handover the BCU Key as part of the Project Documentation to the Building Owner.
Is CVE-2023-4346 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-4346 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-4346?
CVE-2023-4346 affects KNX Association KNX Protocol Connection Authorization Option 1.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.