BACNet Devices Technology Detection Scanner
This scanner detects the use of BACNet Devices and enumerates device information using standard requests. It helps identify and gather essential information for device management and security.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
4 weeks
Scan only one
Domain, IPv4
Toolbox
-
BACNet (Building Automation and Control Networks) devices are used in building automation systems to control and monitor various functions such as HVAC, lighting, and security. These devices are widely employed by facility managers, automation specialists, and IT administrators to ensure efficient operation and energy management in commercial buildings, factories, and residential complexes. This scanner identifies BACNet devices in a network and gathers basic device information to facilitate device inventory and maintenance.
The vulnerability detected pertains to technology identification, which involves enumerating devices based on BACNet's standard response protocols. This allows users to ascertain the presence and type of BACNet devices in their networks, aiding asset management and vulnerability assessments. The scanner identifies key details such as vendor ID, firmware, application software, and device location.
Technical details include probing UDP port 47808 with BACNet-specific packets. The scanner sends standard queries and analyzes the responses to extract information like vendor names, firmware versions, and location descriptions. It leverages BACNet’s standard communication specifications to reliably identify devices and gather metadata, even when errors occur due to older protocol versions.
If exploited, malicious actors could potentially target these devices for further attacks, such as unauthorized control or information theft. Identifying devices and their details helps network administrators strengthen access controls and secure exposed BACNet implementations, mitigating risks associated with unsecured or misconfigured devices.
REFERENCES