All the vulnerabilites related to ABB - Compact HMI
var-202004-2162
Vulnerability from variot
For ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer. plural ABB The product contains a vulnerability related to information leakage.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and others are products of Swiss ABB company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity security application.
There are information disclosure vulnerabilities in many ABB products. The vulnerability stems from programs writing sensitive information to unprotected files
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2162", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "5.1" }, { "model": "system 800xa", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "opcserver for ac800m", "scope": "lte", "trust": 0.6, "vendor": "abb", "version": "\u003c=6.0" }, { "model": "control builder mprofessional", "scope": "lte", "trust": 0.6, "vendor": "abb", "version": "\u003c=6.0" }, { "model": "mmsserver for ac800m", "scope": "lte", "trust": 0.6, "vendor": "abb", "version": "\u003c=6.0" }, { "model": "base software for softcontrol", "scope": "lte", "trust": 0.6, "vendor": "abb", "version": "\u003c=6.0" }, { "model": "ability system 800xa and related system extensions", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "5.1" }, { "model": "ability system 800xa and related system extensions", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.0" }, { "model": "ability system 800xa and related system extensions", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.1" }, { "model": "compact hmi", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.0" }, { "model": "control builder safe", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.0" }, { "model": "control builder safe", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.1" }, { "model": "control builder safe", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "2.0" }, { "model": "ability symphony plus s+ operations", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "-\u003e=3.0,\u003c=3.2" }, { "model": "ability symphony plus s+ engineering", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "-\u003e=1.1,\u003c=2.2" }, { "model": "composer harmony", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "5.1" }, { "model": "composer harmony", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.0" }, { "model": "composer harmony", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.1" }, { "model": "composer melody", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.05.3" }, { "model": "composer melody", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.06.1" }, { "model": "composer melody", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.06.2" }, { "model": "composer melody", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1.06.3" }, { "model": "harmony opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.0" }, { "model": "harmony opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.1" }, { "model": "harmony opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "7.0" }, { "model": "ability system 800xa advant ocs control builder a", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "/1.3" }, { "model": "ability system 800xa advant ocs control builder a", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "/1.4" }, { "model": "advant ocs ac opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1005.1" }, { "model": "advant ocs ac opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1006.0" }, { "model": "advant ocs ac opc server", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1006.1" }, { "model": "composer ctk", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.1" }, { "model": "composer ctk", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "6.2" }, { "model": "advabuild sp1", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "3.7" }, { "model": "advabuild sp2", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "3.7" }, { "model": "opc server mod", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "3001.4" }, { "model": "opc data link", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "2.1" }, { "model": "opc data link", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "2.2" }, { "model": "ability knowledge manager", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "8.0" }, { "model": "ability knowledge manager", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "9.0" }, { "model": "ability knowledge manager", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "9.1" }, { "model": "ability manufacturing operations management", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1812" }, { "model": "ability manufacturing operations management", "scope": "eq", "trust": 0.6, "vendor": "abb", "version": "1909" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULMON", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8481" } ] }, "cve": "CVE-2020-8481", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2020-005100", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-32228", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-186606", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2020-8481", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005100", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8481", "trust": 1.0, "value": "CRITICAL" }, { "author": "cybersecurity@ch.abb.com", "id": "CVE-2020-8481", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-005100", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-32228", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202004-2370", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-186606", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-8481", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" }, { "db": "VULMON", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer. plural ABB The product contains a vulnerability related to information leakage.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and others are products of Swiss ABB company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity security application. \n\r\n\r\nThere are information disclosure vulnerabilities in many ABB products. The vulnerability stems from programs writing sensitive information to unprotected files", "sources": [ { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" }, { "db": "VULMON", "id": "CVE-2020-8481" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8481", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-20-154-04", "trust": 2.0 }, { "db": "JVN", "id": "JVNVU94921886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005100", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-32228", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202004-2370", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1926", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186606", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8481", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" }, { "db": "VULMON", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "id": "VAR-202004-2162", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" } ], "trust": 1.5973266515789475 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" } ] }, "last_update_date": "2023-12-18T11:58:27.793000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and Control Builder Safe", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "title": "SECURITY Multiple Vulnerabilities in ABB Central Licensing System", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005100" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-922", "trust": 1.0 }, { "problemtype": "CWE-200", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186606" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8481" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8481" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94921886/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1926/" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" }, { "db": "VULMON", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-32228" }, { "db": "VULHUB", "id": "VHN-186606" }, { "db": "VULMON", "id": "CVE-2020-8481" }, { "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "db": "NVD", "id": "CVE-2020-8481" }, { "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-32228" }, { "date": "2020-04-29T00:00:00", "db": "VULHUB", "id": "VHN-186606" }, { "date": "2020-04-29T00:00:00", "db": "VULMON", "id": "CVE-2020-8481" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "date": "2020-04-29T02:15:11.907000", "db": "NVD", "id": "CVE-2020-8481" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-10T00:00:00", "db": "CNVD", "id": "CNVD-2020-32228" }, { "date": "2021-09-14T00:00:00", "db": "VULHUB", "id": "VHN-186606" }, { "date": "2020-05-12T00:00:00", "db": "VULMON", "id": "CVE-2020-8481" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005100" }, { "date": "2021-09-14T14:00:32.383000", "db": "NVD", "id": "CVE-2020-8481" }, { "date": "2021-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2370" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2370" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ABB Information leakage vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005100" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2370" } ], "trust": 0.6 } }
var-202004-2158
Vulnerability from variot
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to alter licenses assigned to the system nodes by sending specially crafted messages to the CLS web service. plural ABB The product contains an input verification vulnerability.Information may be tampered with. ABB Ability System 800xA and so on are the products of Swiss ABB (ABB) company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. Central Licensing Server is one of the license servers. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability by sending a specially crafted message to modify the licenses assigned to a system node
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2158", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "5.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.3" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.3.3" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.1-1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.3-2" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "1.0" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "1.1" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "2.0" }, { "model": "compact hmi", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "control builder safe", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "system 800xa", "scope": null, "trust": 0.8, "vendor": "abb", "version": null } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.1-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.3-2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e_feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8476" } ] }, "cve": "CVE-2020-8476", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005097", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-186601", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-8476", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cybersecurity@ch.abb.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005097", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8476", "trust": 1.0, "value": "HIGH" }, { "author": "cybersecurity@ch.abb.com", "id": "CVE-2020-8476", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-005097", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2366", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-186601", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-8476", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186601" }, { "db": "VULMON", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to alter licenses assigned to the system nodes by sending specially crafted messages to the CLS web service. plural ABB The product contains an input verification vulnerability.Information may be tampered with. ABB Ability System 800xA and so on are the products of Swiss ABB (ABB) company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. Central Licensing Server is one of the license servers. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability by sending a specially crafted message to modify the licenses assigned to a system node", "sources": [ { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "VULHUB", "id": "VHN-186601" }, { "db": "VULMON", "id": "CVE-2020-8476" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8476", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-20-154-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU94921886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005097", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2366", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1926", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186601", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8476", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186601" }, { "db": "VULMON", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "id": "VAR-202004-2158", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186601" } ], "trust": 0.32460319000000004 }, "last_update_date": "2023-12-18T11:58:27.103000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and Control Builder Safe", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "title": "SECURITY Multiple Vulnerabilities in ABB Central Licensing System", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186601" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.6, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8476" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8476" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94921886/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1926/" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186601" }, { "db": "VULMON", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186601" }, { "db": "VULMON", "id": "CVE-2020-8476" }, { "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "db": "NVD", "id": "CVE-2020-8476" }, { "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-29T00:00:00", "db": "VULHUB", "id": "VHN-186601" }, { "date": "2020-04-29T00:00:00", "db": "VULMON", "id": "CVE-2020-8476" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "date": "2020-04-29T02:15:11.687000", "db": "NVD", "id": "CVE-2020-8476" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-28T00:00:00", "db": "VULHUB", "id": "VHN-186601" }, { "date": "2020-06-09T00:00:00", "db": "VULMON", "id": "CVE-2020-8476" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005097" }, { "date": "2022-10-28T02:15:16.447000", "db": "NVD", "id": "CVE-2020-8476" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2366" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2366" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ABB Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005097" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2366" } ], "trust": 0.6 } }
var-202004-2161
Vulnerability from variot
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5. an XML External Entity Injection vulnerability exists that allows an attacker to read or call arbitrary files from the license server and/or from the network and also block the license handling. plural ABB The product is blind XPath An injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB Company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2161", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "5.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.3" }, { "model": "800xa system", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.1-1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "6.0.3-2" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "1.0" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "1.1" }, { "model": "control builder safe", "scope": "eq", "trust": 1.1, "vendor": "abb", "version": "2.0" }, { "model": "compact hmi", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "control builder safe", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "system 800xa", "scope": null, "trust": 0.8, "vendor": "abb", "version": null } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.1-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.3-2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e_feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8479" } ] }, "cve": "CVE-2020-8479", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005099", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-186604", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2020-8479", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cybersecurity@ch.abb.com", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.5, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005099", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8479", "trust": 1.0, "value": "CRITICAL" }, { "author": "cybersecurity@ch.abb.com", "id": "CVE-2020-8479", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2020-005099", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-202004-2369", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-186604", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-8479", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186604" }, { "db": "VULMON", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5. an XML External Entity Injection vulnerability exists that allows an attacker to read or call arbitrary files from the license server and/or from the network and also block the license handling. plural ABB The product is blind XPath An injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB Company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products", "sources": [ { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "VULHUB", "id": "VHN-186604" }, { "db": "VULMON", "id": "CVE-2020-8479" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8479", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-20-154-04", "trust": 1.4 }, { "db": "JVN", "id": "JVNVU94921886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005099", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2369", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1926", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186604", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8479", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186604" }, { "db": "VULMON", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "id": "VAR-202004-2161", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186604" } ], "trust": 0.32460319000000004 }, "last_update_date": "2023-12-18T11:58:27.132000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and Control Builder Safe", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "title": "SECURITY Multiple Vulnerabilities in ABB Central Licensing System", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-91", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186604" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.6, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.4, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8479" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8479" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94921886/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1926/" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/91.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186604" }, { "db": "VULMON", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186604" }, { "db": "VULMON", "id": "CVE-2020-8479" }, { "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "db": "NVD", "id": "CVE-2020-8479" }, { "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-29T00:00:00", "db": "VULHUB", "id": "VHN-186604" }, { "date": "2020-04-29T00:00:00", "db": "VULMON", "id": "CVE-2020-8479" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "date": "2020-04-29T02:15:11.827000", "db": "NVD", "id": "CVE-2020-8479" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-28T00:00:00", "db": "VULHUB", "id": "VHN-186604" }, { "date": "2020-06-09T00:00:00", "db": "VULMON", "id": "CVE-2020-8479" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005099" }, { "date": "2022-10-28T02:15:16.580000", "db": "NVD", "id": "CVE-2020-8479" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2369" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2369" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ABB Blinds in the product XPath Injection vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005099" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2369" } ], "trust": 0.6 } }
var-202004-2170
Vulnerability from variot
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, weak file permissions allow an authenticated attacker to block the license handling, escalate his/her privileges and execute arbitrary code. plural ABB The product contains a vulnerability related to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB (ABB) company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. Central Licensing Server is one of the license servers. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability to block license processing, escalate privileges, and execute arbitrary code
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2170", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "control builder safe", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "1.1" }, { "model": "control builder safe", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "1.0" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "control builder safe", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "system 800xa", "scope": null, "trust": 0.8, "vendor": "abb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8471" } ] }, "cve": "CVE-2020-8471", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-005093", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-186596", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-8471", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-005093", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8471", "trust": 1.0, "value": "HIGH" }, { "author": "cybersecurity@ch.abb.com", "id": "CVE-2020-8471", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-005093", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2367", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-186596", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-8471", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186596" }, { "db": "VULMON", "id": "CVE-2020-8471" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, weak file permissions allow an authenticated attacker to block the license handling, escalate his/her privileges and execute arbitrary code. plural ABB The product contains a vulnerability related to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB (ABB) company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. Central Licensing Server is one of the license servers. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability to block license processing, escalate privileges, and execute arbitrary code", "sources": [ { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "VULHUB", "id": "VHN-186596" }, { "db": "VULMON", "id": "CVE-2020-8471" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8471", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-20-154-04", "trust": 2.6 }, { "db": "JVN", "id": "JVNVU94921886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005093", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2367", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1926", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186596", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8471", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186596" }, { "db": "VULMON", "id": "CVE-2020-8471" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "id": "VAR-202004-2170", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186596" } ], "trust": 0.32460319000000004 }, "last_update_date": "2023-12-18T11:58:23.812000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and Control Builder Safe", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "title": "SECURITY Multiple Vulnerabilities in ABB Central Licensing System", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005093" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186596" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8471" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8471" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94921886/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1926/" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186596" }, { "db": "VULMON", "id": "CVE-2020-8471" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186596" }, { "db": "VULMON", "id": "CVE-2020-8471" }, { "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "db": "NVD", "id": "CVE-2020-8471" }, { "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-29T00:00:00", "db": "VULHUB", "id": "VHN-186596" }, { "date": "2020-04-29T00:00:00", "db": "VULMON", "id": "CVE-2020-8471" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "date": "2020-04-29T02:15:11.530000", "db": "NVD", "id": "CVE-2020-8471" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-09T00:00:00", "db": "VULHUB", "id": "VHN-186596" }, { "date": "2020-06-09T00:00:00", "db": "VULMON", "id": "CVE-2020-8471" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005093" }, { "date": "2020-06-09T17:15:10.520000", "db": "NVD", "id": "CVE-2020-8471" }, { "date": "2020-06-04T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2367" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2367" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ABB Inappropriate default permissions in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005093" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2367" } ], "trust": 0.6 } }
var-202004-2157
Vulnerability from variot
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to block license handling by sending specially crafted messages to the CLS web service. plural ABB The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB Company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-2157", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "control builder safe", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "1.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "5.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0.3" }, { "model": "compact hmi", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0.1-1" }, { "model": "control builder safe", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "2.0" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0.3.3" }, { "model": "control builder safe", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "1.0" }, { "model": "compact hmi", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "5.1" }, { "model": "compact hmi", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0.3-2" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.1" }, { "model": "800xa system", "scope": "eq", "trust": 1.0, "vendor": "abb", "version": "6.0" }, { "model": "compact hmi", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "control builder safe", "scope": null, "trust": 0.8, "vendor": "abb", "version": null }, { "model": "system 800xa", "scope": null, "trust": 0.8, "vendor": "abb", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_a:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_c:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:control_builder_safe:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.1-1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:6.0.3-2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.0.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:800xa_system:5.1:revision_e_feature_pack_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:feature_pack_4_revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_b:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:abb:compact_hmi:5.1:revision_d:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8475" } ] }, "cve": "CVE-2020-8475", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005096", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-186600", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-8475", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "cybersecurity@ch.abb.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-005096", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8475", "trust": 1.0, "value": "HIGH" }, { "author": "cybersecurity@ch.abb.com", "id": "CVE-2020-8475", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "JVNDB-2020-005096", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202004-2365", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-186600", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-8475", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-186600" }, { "db": "VULMON", "id": "CVE-2020-8475" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to block license handling by sending specially crafted messages to the CLS web service. plural ABB The product contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state. ABB Ability System 800xA and so on are the products of Swiss ABB Company. ABB Ability System 800xA is a distributed control system for industrial control industry. ABB Compact HMI is a monitoring and data acquisition system. ABB Control Builder Safe is an engineering tool for configuring and downloading the AC 800M High Integrity safety application. An input validation error vulnerability exists in the Central Licensing Server component of several ABB products. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "VULHUB", "id": "VHN-186600" }, { "db": "VULMON", "id": "CVE-2020-8475" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8475", "trust": 2.6 }, { "db": "ICS CERT", "id": "ICSA-20-154-04", "trust": 1.5 }, { "db": "JVN", "id": "JVNVU94921886", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-005096", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202004-2365", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2020.1926", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-186600", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-8475", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186600" }, { "db": "VULMON", "id": "CVE-2020-8475" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "id": "VAR-202004-2157", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-186600" } ], "trust": 0.32460319000000004 }, "last_update_date": "2023-12-18T11:58:27.764000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and Control Builder Safe", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "title": "SECURITY Multiple Vulnerabilities in ABB Central Licensing System", "trust": 0.8, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005096" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-186600" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.7, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.6, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026languagecode=en\u0026documentpartid=\u0026action=launch" }, { "trust": 1.5, "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8475" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8475" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu94921886/index.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1926/" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121230\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=2paa121231\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://search.abb.com/library/download.aspx?documentid=3cca2020-003309\u0026amp;languagecode=en\u0026amp;documentpartid=\u0026amp;action=launch" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-186600" }, { "db": "VULMON", "id": "CVE-2020-8475" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-186600" }, { "db": "VULMON", "id": "CVE-2020-8475" }, { "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "db": "NVD", "id": "CVE-2020-8475" }, { "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-29T00:00:00", "db": "VULHUB", "id": "VHN-186600" }, { "date": "2020-04-29T00:00:00", "db": "VULMON", "id": "CVE-2020-8475" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "date": "2020-04-29T02:15:11.623000", "db": "NVD", "id": "CVE-2020-8475" }, { "date": "2020-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-28T00:00:00", "db": "VULHUB", "id": "VHN-186600" }, { "date": "2020-06-09T00:00:00", "db": "VULMON", "id": "CVE-2020-8475" }, { "date": "2020-06-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-005096" }, { "date": "2022-10-28T02:15:14.257000", "db": "NVD", "id": "CVE-2020-8475" }, { "date": "2022-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-202004-2365" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2365" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural ABB Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-005096" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202004-2365" } ], "trust": 0.6 } }
cve-2020-8479
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "ABB Ability\u2122 SCADAvantage", "vendor": "ABB", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThanOrEqual": "5.6.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5. an XML External Entity Injection vulnerability exists that allows an attacker to read or call arbitrary files from the license server and/or from the network and also block the license handling." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-91", "description": "CWE-91 XML Injection (aka Blind XPath Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - XML External Entity Injection", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8479", "datePublished": "2020-04-29T00:00:00", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8471
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, weak file permissions allow an authenticated attacker to block the license handling, escalate his/her privileges and execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-275", "description": "CWE-275 Permission Issues", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-09T16:16:51", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - Weak File Permissions", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@ch.abb.com", "ID": "CVE-2020-8471", "STATE": "PUBLIC", "TITLE": "ABB Central Licensing System - Weak File Permissions" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Central Licensing System", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "5", "version_value": "5.1" } ] } }, { "product_name": "ABB Ability System 800xA", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } }, { "product_name": "Compact HMI", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" } ] } }, { "product_name": "Control Builder Safe", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" }, { "version_affected": "=", "version_value": "1.1" }, { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Symphony Plus S+ Operations", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "3", "version_value": "3.2" } ] } }, { "product_name": "Symphony Plus S+ Engineering ", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "1.1", "version_value": "2.2" } ] } }, { "product_name": "Composer Harmony", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } }, { "product_name": "Composer Melody ", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.3" }, { "version_affected": "\u003c=", "version_name": "6", "version_value": "6.3" } ] } }, { "product_name": "Harmony OPC Server Standalone", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" }, { "version_affected": "=", "version_value": "7.0" } ] } }, { "product_name": "Advant OCS Control Builder A", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.3" }, { "version_affected": "=", "version_value": "1.4" } ] } }, { "product_name": "Composer CTK", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.1" }, { "version_affected": "=", "version_value": "6.2" } ] } }, { "product_name": "AdvaBuild", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.7 SP1" }, { "version_affected": "=", "version_value": "3.7 SP2" } ] } }, { "product_name": "OPC Server for Mod 300 (non-800xA)", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.4" } ] } }, { "product_name": "OPC Data Link", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1" }, { "version_affected": "=", "version_value": "2.2" } ] } }, { "product_name": "Knowledge Manager", "version": { "version_data": [ { "version_affected": "=", "version_value": "8.0" }, { "version_affected": "=", "version_value": "9.0" }, { "version_affected": "=", "version_value": "9.1" } ] } }, { "product_name": "Manufacturing Operations Management", "version": { "version_data": [ { "version_affected": "=", "version_value": "1812" }, { "version_affected": "=", "version_value": "1909" } ] } }, { "product_name": "Advant OCS AC 100 OPS Server", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } } ] }, "vendor_name": "ABB" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, weak file permissions allow an authenticated attacker to block the license handling, escalate his/her privileges and execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-275 Permission Issues" } ] } ] }, "references": { "reference_data": [ { "name": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "CONFIRM", "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "name": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "CONFIRM", "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "name": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04", "refsource": "MISC", "url": "https://www.us-cert.gov/ics/advisories/icsa-20-154-04" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8471", "datePublished": "2020-04-29T01:30:43", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8476
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:45.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "ABB Ability\u2122 SCADAvantage", "vendor": "ABB", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThanOrEqual": "5.6.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to alter licenses assigned to the system nodes by sending specially crafted messages to the CLS web service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - Elevation of Privilege Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8476", "datePublished": "2020-04-29T00:00:00", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:45.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8475
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:44.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "ABB Ability\u2122 SCADAvantage", "vendor": "ABB", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "5.1", "versionType": "custom" }, { "lessThanOrEqual": "5.6.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "For the Central Licensing Server component used in ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to block license handling by sending specially crafted messages to the CLS web service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-28T00:00:00", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "url": "https://search.abb.com/library/Download.aspx?DocumentID=3CCA2020-003309\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - Denial of Service Vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8475", "datePublished": "2020-04-29T00:00:00", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:44.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8481
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | ABB | Central Licensing System |
Version: 5.1 < 5* |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:45.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Central Licensing System", "vendor": "ABB", "versions": [ { "lessThan": "5*", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "ABB Ability System 800xA", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Compact HMI", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" } ] }, { "product": "Control Builder Safe", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "1.1" }, { "status": "affected", "version": "2.0" } ] }, { "product": "Symphony Plus S+ Operations", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "3.2", "status": "affected", "version": "3", "versionType": "custom" } ] }, { "product": "Symphony Plus S+ Engineering ", "vendor": "ABB", "versions": [ { "lessThanOrEqual": "2.2", "status": "affected", "version": "1.1", "versionType": "custom" } ] }, { "product": "Composer Harmony", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] }, { "product": "Composer Melody ", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.3" }, { "lessThanOrEqual": "6.3", "status": "affected", "version": "6", "versionType": "custom" } ] }, { "product": "Harmony OPC Server Standalone", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "7.0" } ] }, { "product": "Advant OCS Control Builder A", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.3" }, { "status": "affected", "version": "1.4" } ] }, { "product": "Composer CTK", "vendor": "ABB", "versions": [ { "status": "affected", "version": "6.1" }, { "status": "affected", "version": "6.2" } ] }, { "product": "AdvaBuild", "vendor": "ABB", "versions": [ { "status": "affected", "version": "3.7 SP1" }, { "status": "affected", "version": "3.7 SP2" } ] }, { "product": "OPC Server for Mod 300 (non-800xA)", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1.4" } ] }, { "product": "OPC Data Link", "vendor": "ABB", "versions": [ { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" } ] }, { "product": "Knowledge Manager", "vendor": "ABB", "versions": [ { "status": "affected", "version": "8.0" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.1" } ] }, { "product": "Manufacturing Operations Management", "vendor": "ABB", "versions": [ { "status": "affected", "version": "1812" }, { "status": "affected", "version": "1909" } ] }, { "product": "Advant OCS AC 100 OPS Server", "vendor": "ABB", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" } ] } ], "descriptions": [ { "lang": "en", "value": "For ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-29T01:30:56", "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "shortName": "ABB" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ], "source": { "discovery": "UNKNOWN" }, "title": "ABB Central Licensing System - Information disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cybersecurity@ch.abb.com", "ID": "CVE-2020-8481", "STATE": "PUBLIC", "TITLE": "ABB Central Licensing System - Information disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Central Licensing System", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "5", "version_value": "5.1" } ] } }, { "product_name": "ABB Ability System 800xA", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } }, { "product_name": "Compact HMI", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" } ] } }, { "product_name": "Control Builder Safe", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" }, { "version_affected": "=", "version_value": "1.1" }, { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Symphony Plus S+ Operations", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "3", "version_value": "3.2" } ] } }, { "product_name": "Symphony Plus S+ Engineering ", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "1.1", "version_value": "2.2" } ] } }, { "product_name": "Composer Harmony", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } }, { "product_name": "Composer Melody ", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.3" }, { "version_affected": "\u003c=", "version_name": "6", "version_value": "6.3" } ] } }, { "product_name": "Harmony OPC Server Standalone", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" }, { "version_affected": "=", "version_value": "7.0" } ] } }, { "product_name": "Advant OCS Control Builder A", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.3" }, { "version_affected": "=", "version_value": "1.4" } ] } }, { "product_name": "Composer CTK", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.1" }, { "version_affected": "=", "version_value": "6.2" } ] } }, { "product_name": "AdvaBuild", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.7 SP1" }, { "version_affected": "=", "version_value": "3.7 SP2" } ] } }, { "product_name": "OPC Server for Mod 300 (non-800xA)", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.4" } ] } }, { "product_name": "OPC Data Link", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1" }, { "version_affected": "=", "version_value": "2.2" } ] } }, { "product_name": "Knowledge Manager", "version": { "version_data": [ { "version_affected": "=", "version_value": "8.0" }, { "version_affected": "=", "version_value": "9.0" }, { "version_affected": "=", "version_value": "9.1" } ] } }, { "product_name": "Manufacturing Operations Management", "version": { "version_data": [ { "version_affected": "=", "version_value": "1812" }, { "version_affected": "=", "version_value": "1909" } ] } }, { "product_name": "Advant OCS AC 100 OPS Server", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.1" }, { "version_affected": "=", "version_value": "6.0" }, { "version_affected": "=", "version_value": "6.1" } ] } } ] }, "vendor_name": "ABB" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For ABB products ABB Ability\u2122 System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability\u2122 System 800xA/ Advant\u00ae OCS Control Builder A 1.3 and 1.4, Advant\u00ae OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "CONFIRM", "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121231\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" }, { "name": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch", "refsource": "CONFIRM", "url": "https://search.abb.com/library/Download.aspx?DocumentID=2PAA121230\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9", "assignerShortName": "ABB", "cveId": "CVE-2020-8481", "datePublished": "2020-04-29T01:30:56", "dateReserved": "2020-01-30T00:00:00", "dateUpdated": "2024-08-04T10:03:45.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }