Project Subscriptions
No data.
No advisories yet.
Solution
For DDC520, DDC4002e, DDC4200e, DDC4400e, DDC4020e, and DDC4040e controllers, update the firmware to the latest available version: * DDC4002e: Update to version 1.23.5 or newer * DDC4200e: Update to version 1.23.5 or newer * DDC4400e: Update to version 1.23.5 or newer * DDC4020e: Update to version 1.23.5 or newer * DDC4040e: Update to version 1.23.5 or newer * DDC520: Update to version 1.24.2 or newer
Workaround
Kieback & Peter DDC Building Controllers are developed and designed for use in closed building automation networks. The system is protected by a multi-level perimeter against attacks, especially from outside, by dividing it into operational technology (OT) zones with firewalls. Building automation systems (BA systems) in general should not be directly accessible from untrusted networks, especially from the Internet, but should be protected by consistently applying the defense-in-depth strategy. This concept is supported by organizational measures in the building as part of a safety management system. In order to achieve safety, measures are required at all levels.
Wed, 20 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The affected Kieback & Peter DDC building controllers are vulnerable to cross-site scripting, enabling JavaScript to be executed by the victim's browser, which allows the attacker to control the browser. | |
| Title | Kieback & Peter DDC Building Controllers Cross-site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-05-20T14:45:45.161Z
Reserved: 2026-03-16T17:01:03.386Z
Link: CVE-2026-4293
No data.
No data.
No data.
OpenCVE Enrichment
No data.