Vulnerabilites related to abb - aspect-ent-2
cve-2024-6298
Vulnerability from cvelistv5
Published
2024-07-05 11:06
Modified
2024-12-05 12:16
Severity ?
9.4 (Critical) - CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:I/V:C/RE:H/U:Red
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS score ?
Summary
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series
v3.08.01
; MATRIX Series
v3.08.01 allows Attacker to execute arbitrary code remotely
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | ASPECT-Enterprise |
Version: 0 < |
|||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-2_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-96_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-a_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-f_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-g_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264-a_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264-f_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nexus-264-g_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-3-2128_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-3-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-11_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-216_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-232_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-12_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-256_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-296_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6298", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T17:05:07.391904Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:24:03.161Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\u0026_ga=2.39956449.23035250.1719878527-141379670.1701144964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "ASPECT-Enterprise", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "NEXUS Series", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "MATRIX Series", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to execute arbitrary code remotely\u0026nbsp;" } ], "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to execute arbitrary code remotely" } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "IRRECOVERABLE", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "baseScore": 9.4, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "RED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:I/V:C/RE:H/U:Red", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "HIGH" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1287", "description": "CWE-1287 Improper Validation of Specified Type of Input", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T12:16:19.488Z", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "EXTERNAL" }, "title": "remote code execution", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2024-6298", "datePublished": "2024-07-05T11:06:35.066Z", "dateReserved": "2024-06-25T06:38:32.703Z", "dateUpdated": "2024-12-05T12:16:19.488Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6209
Vulnerability from cvelistv5
Published
2024-07-05 11:10
Modified
2024-12-05 12:13
Severity ?
9.4 (Critical) - CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:I/V:C/RE:H/U:Red
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS score ?
Summary
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series
v3.08.01
; MATRIX Series
v3.08.01 allows Attacker to access files unauthorized
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | ASPECT-Enterprise |
Version: 0 < |
|||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-2_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-96_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-a_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-f_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-2128-g_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264-a_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264-f_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nexus-264-g_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-3-2128_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "nexus-3-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-11_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-216_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-232_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-264_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-12_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "aspect-ent-256_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "matrix-296_firmware", "vendor": "abb", "versions": [ { "lessThan": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-6209", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-05T17:24:31.125468Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-05T17:24:44.098Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:33:05.139Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\u0026_ga=2.39956449.23035250.1719878527-141379670.1701144964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "ASPECT-Enterprise", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "NEXUS Series", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "MATRIX Series", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.08.01", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to access files unauthorized\u0026nbsp;" } ], "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to access files unauthorized" } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "IRRECOVERABLE", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "baseScore": 9.4, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "RED", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:I/V:C/RE:H/U:Red", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "HIGH" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-552", "description": "CWE-552 Files or Directories Accessible to External Parties", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-05T12:13:47.544Z", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "EXTERNAL" }, "title": "unauthorized file access", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2024-6209", "datePublished": "2024-07-05T11:10:05.458Z", "dateReserved": "2024-06-20T16:27:24.196Z", "dateUpdated": "2024-12-05T12:13:47.544Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0636
Vulnerability from cvelistv5
Published
2023-06-05 03:45
Modified
2025-01-08 17:40
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB Ltd. | ASPECT®-Enterprise |
Version: 3.0;0 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0636", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T17:40:07.260096Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T17:40:16.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "2CQG103201S3021", "2CQG103202S3021", "2CQG103203S3021", "2CQG103204S3021" ], "platforms": [ "ASPECT\u00ae-Enterprise", "Linux" ], "product": "ASPECT\u00ae-Enterprise", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.0", "status": "affected", "version": "3.0;0", "versionType": "update" } ] }, { "defaultStatus": "unaffected", "modules": [ "2CQG100102R2021", "2CQG100104R2021", "2CQG100105R2021", "2CQG100106R2021", "2CQG100110R2021", "2CQG100112R2021", "2CQG100103R2021", "2CQG100107R2021", "2CQG100108R2021", "2CQG100109R2021", "2CQG100111R2021", "2CQG100113R2021" ], "platforms": [ "NEXUS Series", "Linux" ], "product": "NEXUS Series", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.0", "status": "affected", "version": "3.0;0", "versionType": "update" } ] }, { "defaultStatus": "unaffected", "modules": [ "2CQG100102R1021", "2CQG100103R1021", "2CQG100104R1021", "2CQG100105R1021", "2CQG100106R1021" ], "platforms": [ "MATRIX Series", "Linux" ], "product": "MATRIX Series", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.1", "status": "affected", "version": "3.0;0", "versionType": "update" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ABB would like to thank Prism Infosec for identifying this vulnerability in its products and for dealing with it in a professional manner." } ], "datePublic": "2023-06-01T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.\u003cp\u003eThis issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T16:50:20.602Z", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "advisory": "ABBVREP0088", "discovery": "UNKNOWN" }, "title": "Remote Code Execution via Command Injection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2023-0636", "datePublished": "2023-06-05T03:45:09.898Z", "dateReserved": "2023-02-02T07:19:50.140Z", "dateUpdated": "2025-01-08T17:40:16.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0635
Vulnerability from cvelistv5
Published
2023-06-05 03:42
Modified
2025-01-08 16:42
Severity ?
EPSS score ?
Summary
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.
References
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB Ltd. | ASPECT®-Enterprise |
Version: 3.0;0 |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:17:50.128Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0635", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-08T16:42:41.700285Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-08T16:42:53.322Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "2CQG103201S3021", "2CQG103202S3021", "2CQG103203S3021", "2CQG103204S3021" ], "platforms": [ "ASPECT\u00ae-Enterprise", "Linux" ], "product": "ASPECT\u00ae-Enterprise", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.01", "status": "affected", "version": "3.0;0", "versionType": "update" } ] }, { "defaultStatus": "unaffected", "modules": [ "2CQG100102R2021", "2CQG100104R2021", "2CQG100105R2021", "2CQG100106R2021", "2CQG100110R2021", "2CQG100112R2021", "2CQG100103R2021", "2CQG100107R2021", "2CQG100108R2021", "2CQG100109R2021", "2CQG100111R2021", "2CQG100113R2021" ], "platforms": [ "NEXUS Series", "Linux" ], "product": "NEXUS Series", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.01", "status": "affected", "version": "3.0;0", "versionType": "update" } ] }, { "defaultStatus": "unaffected", "modules": [ "2CQG100102R1021", "2CQG100103R1021", "2CQG100104R1021", "2CQG100105R1021", "2CQG100106R1021" ], "platforms": [ "MATRIX Series", "Linux" ], "product": "MATRIX Series", "vendor": "ABB Ltd.", "versions": [ { "lessThan": "3.07.01", "status": "affected", "version": "3.0;0", "versionType": "update" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "ABB would like to thank Prism Infosec for identifying this vulnerability in its products and for dealing with it in a professional manner." } ], "datePublic": "2023-06-01T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Privilege Management vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.\u003cp\u003eThis issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.\u003c/p\u003e" } ], "value": "Improper Privilege Management vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1391", "description": "CWE-1391: Use of Weak Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-19T14:27:48.422Z", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "advisory": "ABBVREP0088", "discovery": "UNKNOWN" }, "title": "Privilege escalation to root", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2023-0635", "datePublished": "2023-06-05T03:42:04.704Z", "dateReserved": "2023-02-02T07:19:48.321Z", "dateUpdated": "2025-01-08T16:42:53.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-06-05 04:15
Modified
2024-11-21 07:37
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90915F51-F953-463D-9DC9-920A6BDE339A", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A584338E-68E3-4A18-9210-EC9B5BB1931B", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886F345B-B8A8-4FB5-B7E8-E1814B5C9649", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28963E35-B5B5-417F-B49B-5A4836F95949", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C574A1-D4AB-4973-8F59-623FBA23ABE9", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529748B3-25B5-4D40-B71E-F8DBC5AA4CFB", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DC90491-EEF2-4893-BA1E-4F41E716ED8B", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2D20353-5535-4DFC-972D-D7C0AE020943", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC6B5035-9627-4A06-B4D1-BC845A5387A2", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "862E9C0F-1334-4BEF-9E22-AE3EC9E0A17F", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDC4937A-5EF3-40A5-A5F8-AEB617C87481", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4524FEB-AA98-4515-A140-6B53DEE82545", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "257FD712-153D-48A7-83BA-94B07BACD8D4", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "531B160D-0FE9-44A2-A64D-C310CBF48433", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5C6E19F-9B07-45D0-A001-6F0D909B9D13", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994F4371-2AFF-4FC5-ABC7-CCE3E260643A", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC58A9B8-2D12-4117-890A-53B52DCAE1EC", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "340901DB-3492-4202-9B54-F107D2B9E8C0", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13A433D2-9A61-49EB-8382-1D5024E70B88", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1." } ], "id": "CVE-2023-0636", "lastModified": "2024-11-21T07:37:31.600", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "cybersecurity@ch.abb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-05T04:15:10.587", "references": [ { "source": "cybersecurity@ch.abb.com", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "sourceIdentifier": "cybersecurity@ch.abb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "cybersecurity@ch.abb.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-05 04:15
Modified
2024-11-21 07:37
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90915F51-F953-463D-9DC9-920A6BDE339A", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A584338E-68E3-4A18-9210-EC9B5BB1931B", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "886F345B-B8A8-4FB5-B7E8-E1814B5C9649", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28963E35-B5B5-417F-B49B-5A4836F95949", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C574A1-D4AB-4973-8F59-623FBA23ABE9", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "529748B3-25B5-4D40-B71E-F8DBC5AA4CFB", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DC90491-EEF2-4893-BA1E-4F41E716ED8B", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2D20353-5535-4DFC-972D-D7C0AE020943", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC6B5035-9627-4A06-B4D1-BC845A5387A2", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "862E9C0F-1334-4BEF-9E22-AE3EC9E0A17F", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDC4937A-5EF3-40A5-A5F8-AEB617C87481", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4524FEB-AA98-4515-A140-6B53DEE82545", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "257FD712-153D-48A7-83BA-94B07BACD8D4", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "531B160D-0FE9-44A2-A64D-C310CBF48433", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5C6E19F-9B07-45D0-A001-6F0D909B9D13", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "994F4371-2AFF-4FC5-ABC7-CCE3E260643A", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC58A9B8-2D12-4117-890A-53B52DCAE1EC", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "340901DB-3492-4202-9B54-F107D2B9E8C0", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13A433D2-9A61-49EB-8382-1D5024E70B88", "versionEndExcluding": "3.07.01", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Privilege Management vulnerability in ABB Ltd. ASPECT\u00ae-Enterprise on ASPECT\u00ae-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT\u00ae-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01." } ], "id": "CVE-2023-0635", "lastModified": "2024-11-21T07:37:31.433", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "cybersecurity@ch.abb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-05T04:15:09.493", "references": [ { "source": "cybersecurity@ch.abb.com", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "sourceIdentifier": "cybersecurity@ch.abb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1391" } ], "source": "cybersecurity@ch.abb.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-05 11:15
Modified
2024-12-05 13:15
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series
v3.08.01
; MATRIX Series
v3.08.01 allows Attacker to execute arbitrary code remotely
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657304E9-2877-46DC-A119-EDBB493746DA", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E063E70E-D02D-4E62-B42F-BA8E3B462D09", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6BDCAA2-594F-48C4-BEF5-4361EC4945A1", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEECC7F5-C8E3-425A-9B41-4B298D29BE6B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAF660DF-C231-46AD-825E-8C446EC24A3E", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21DD67BB-85EF-4DD9-8256-F52E7DAADEE3", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62654DD7-8BE1-4268-8571-D7B7AA750323", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E7E46A6-9B6A-4D35-9B36-8C056E0D1B49", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139ED7CD-AA56-478A-9339-18E4C61D86B3", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60F1E134-26D9-45B7-87A4-7E4FF31BAEDC", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D527ECD-7921-4810-8C45-B81C7B51137F", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3854E84E-7331-428C-AA8B-6E6CCA91F51F", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34A0EB12-D46B-4FA2-B00B-9A64D1FF759B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C00B19E2-21B3-419E-B773-8E4AEF295EB4", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A307B225-C3FA-4DEE-8577-D43411214BD2", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C13FD3-7824-4B60-82A8-16B44670BB9D", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF32B164-71B5-41A3-9D0C-3AB1D8EC7336", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D92B482-D5D1-422D-B667-A3C3534563C7", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ABD8E5-E9F9-46BE-BD01-635FD035279B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to execute arbitrary code remotely" }, { "lang": "es", "value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en ABB ASPECT-Enterprise en Linux, ABB NEXUS Series en Linux, ABB MATRIX Series en Linux permite la inclusi\u00f3n remota de c\u00f3digo. Este problema afecta a ASPECT-Enterprise: hasta 3.08.01; Serie NEXUS: hasta el 3.08.01; Serie MATRIX: hasta el 3.08.01." } ], "id": "CVE-2024-6298", "lastModified": "2024-12-05T13:15:09.803", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "cybersecurity@ch.abb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "automatable": "YES", "availabilityRequirements": "NOT_DEFINED", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "RED", "recovery": "IRRECOVERABLE", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:I/V:C/RE:H/U:Red", "version": "4.0", "vulnerabilityResponseEffort": "HIGH", "vulnerableSystemAvailability": "HIGH", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH" }, "source": "cybersecurity@ch.abb.com", "type": "Secondary" } ] }, "published": "2024-07-05T11:15:10.617", "references": [ { "source": "cybersecurity@ch.abb.com", "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\u0026_ga=2.39956449.23035250.1719878527-141379670.1701144964" } ], "sourceIdentifier": "cybersecurity@ch.abb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1287" } ], "source": "cybersecurity@ch.abb.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-05 11:15
Modified
2024-12-05 13:15
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series
v3.08.01
; MATRIX Series
v3.08.01 allows Attacker to access files unauthorized
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "657304E9-2877-46DC-A119-EDBB493746DA", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D3FE8A0-B7B1-496F-918B-83AECEC80486", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E063E70E-D02D-4E62-B42F-BA8E3B462D09", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6351DE-8170-4023-B815-536030F9236E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6BDCAA2-594F-48C4-BEF5-4361EC4945A1", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*", "matchCriteriaId": "125AAF0E-3CB2-4F5A-BA04-742918422422", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEECC7F5-C8E3-425A-9B41-4B298D29BE6B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC1901E-7476-4070-B649-E2EAE52A38A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAF660DF-C231-46AD-825E-8C446EC24A3E", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "697D73AC-8567-4D25-B42F-FB584DAFF05F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21DD67BB-85EF-4DD9-8256-F52E7DAADEE3", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1C4B551-EC7D-4D96-9B44-5238B2671F38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62654DD7-8BE1-4268-8571-D7B7AA750323", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC1B0FAC-EE50-41E7-8C6A-63E28649A539", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E7E46A6-9B6A-4D35-9B36-8C056E0D1B49", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "86993CA6-E80C-464D-A208-EB119F41E106", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139ED7CD-AA56-478A-9339-18E4C61D86B3", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "979B2BF4-885C-46B4-9093-E7CC35EBB397", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "60F1E134-26D9-45B7-87A4-7E4FF31BAEDC", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3961881-0563-443D-8381-428058A008DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D527ECD-7921-4810-8C45-B81C7B51137F", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "43EB9B15-B1DF-49DC-B69C-00D0342E0592", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3854E84E-7331-428C-AA8B-6E6CCA91F51F", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E7E5C1B-CFA0-4584-89F5-BE9190DC7DB7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34A0EB12-D46B-4FA2-B00B-9A64D1FF759B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*", "matchCriteriaId": "66A14E33-5416-45D9-BBE4-61EFEC246E20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C00B19E2-21B3-419E-B773-8E4AEF295EB4", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "96BF51C6-E220-4347-9505-48DAE2BB26B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A307B225-C3FA-4DEE-8577-D43411214BD2", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C13FD3-7824-4B60-82A8-16B44670BB9D", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*", "matchCriteriaId": "653A6815-9BC7-4BD4-BB67-DBCC666ED860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF32B164-71B5-41A3-9D0C-3AB1D8EC7336", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C07D72-CA89-40A1-8EE8-F48A06DB7992", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D92B482-D5D1-422D-B667-A3C3534563C7", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E8A1A8-8476-4C36-A6F6-258C2DC60388", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F8ABD8E5-E9F9-46BE-BD01-635FD035279B", "versionEndIncluding": "3.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*", "matchCriteriaId": "699E0759-590A-4362-9B5B-F876C1A020D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series\n\n v3.08.01\n\n; MATRIX Series \n\n v3.08.01 allows Attacker to access files unauthorized" }, { "lang": "es", "value": "Acceso no autorizado a archivos en WEB Server en ABB ASPECT - Enterprise v \u0026lt;=3.08.01; Serie NEXUS v \u0026lt;=3.08.01; MATRIX Series v\u0026lt;=3.08.01 permite a un atacante acceder a archivos no autorizados" } ], "id": "CVE-2024-6209", "lastModified": "2024-12-05T13:15:09.583", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "cybersecurity@ch.abb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "automatable": "YES", "availabilityRequirements": "NOT_DEFINED", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "RED", "recovery": "IRRECOVERABLE", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:I/V:C/RE:H/U:Red", "version": "4.0", "vulnerabilityResponseEffort": "HIGH", "vulnerableSystemAvailability": "HIGH", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "HIGH" }, "source": "cybersecurity@ch.abb.com", "type": "Secondary" } ] }, "published": "2024-07-05T11:15:10.080", "references": [ { "source": "cybersecurity@ch.abb.com", "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\u0026_ga=2.39956449.23035250.1719878527-141379670.1701144964" } ], "sourceIdentifier": "cybersecurity@ch.abb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "cybersecurity@ch.abb.com", "type": "Primary" } ] }