Search criteria

2 vulnerabilities found for Control Builder Safe, version 2.0 OPC Server for AC 800M by ABB

CVE-2021-22284 (GCVE-0-2021-22284)

Vulnerability from cvelistv5 – Published: 2022-02-04 22:29 – Updated: 2024-09-16 19:56
VLAI?
Title
SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability
Summary
Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
ABB
References
Impacted products
Vendor Product Version
ABB 800xA, Control Software for AC 800M OPC Server for AC 800M Affected: unspecified , ≤ 5.1.0-x (custom)
Affected: unspecified , ≤ 5.1.1-x (custom)
Affected: 6.0.0-1
Affected: 6.0.0-2
Affected: 6.0.0-3
Create a notification for this product.
Credits
ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:37:18.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "800xA, Control Software for AC 800M OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "lessThanOrEqual": "5.1.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.1.1-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "6.0.0-1"
            },
            {
              "status": "affected",
              "version": "6.0.0-2"
            },
            {
              "status": "affected",
              "version": "6.0.0-3"
            }
          ]
        },
        {
          "product": "Control Builder Safe, version 1.x OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "5.1.1-1"
            }
          ]
        },
        {
          "product": "Control Builder Safe, version 2.0 OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "6.0.0-1"
            }
          ]
        },
        {
          "product": "Compact Product Suite - Control and I/O OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "lessThanOrEqual": "5.1.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.1.1-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.0.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers."
        }
      ],
      "datePublic": "2022-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-04T22:29:21",
        "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
        "shortName": "ABB"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Customers on version 5.1 or older are recommended to upgrade to a supported version that is not affected by this issue such as version 6.1 or later."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@ch.abb.com",
          "DATE_PUBLIC": "2022-01-24T11:58:00.000Z",
          "ID": "CVE-2021-22284",
          "STATE": "PUBLIC",
          "TITLE": "SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "800xA, Control Software for AC 800M OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.0-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.1-x"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Control Builder Safe, version 1.x OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.1.1-1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Control Builder Safe, version 2.0 OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Compact Product Suite - Control and I/O OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.0-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.1-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "6.0.0-x"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ABB"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-732 Incorrect Permission Assignment for Critical Resource"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch",
              "refsource": "MISC",
              "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Customers on version 5.1 or older are recommended to upgrade to a supported version that is not affected by this issue such as version 6.1 or later."
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
    "assignerShortName": "ABB",
    "cveId": "CVE-2021-22284",
    "datePublished": "2022-02-04T22:29:21.143636Z",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-09-16T19:56:36.751Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-22284 (GCVE-0-2021-22284)

Vulnerability from nvd – Published: 2022-02-04 22:29 – Updated: 2024-09-16 19:56
VLAI?
Title
SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability
Summary
Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
ABB
References
Impacted products
Vendor Product Version
ABB 800xA, Control Software for AC 800M OPC Server for AC 800M Affected: unspecified , ≤ 5.1.0-x (custom)
Affected: unspecified , ≤ 5.1.1-x (custom)
Affected: 6.0.0-1
Affected: 6.0.0-2
Affected: 6.0.0-3
Create a notification for this product.
Credits
ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:37:18.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "800xA, Control Software for AC 800M OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "lessThanOrEqual": "5.1.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.1.1-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "6.0.0-1"
            },
            {
              "status": "affected",
              "version": "6.0.0-2"
            },
            {
              "status": "affected",
              "version": "6.0.0-3"
            }
          ]
        },
        {
          "product": "Control Builder Safe, version 1.x OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "5.1.1-1"
            }
          ]
        },
        {
          "product": "Control Builder Safe, version 2.0 OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "6.0.0-1"
            }
          ]
        },
        {
          "product": "Compact Product Suite - Control and I/O OPC Server for AC 800M",
          "vendor": "ABB",
          "versions": [
            {
              "lessThanOrEqual": "5.1.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "5.1.1-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "6.0.0-x",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers."
        }
      ],
      "datePublic": "2022-01-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-04T22:29:21",
        "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
        "shortName": "ABB"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Customers on version 5.1 or older are recommended to upgrade to a supported version that is not affected by this issue such as version 6.1 or later."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cybersecurity@ch.abb.com",
          "DATE_PUBLIC": "2022-01-24T11:58:00.000Z",
          "ID": "CVE-2021-22284",
          "STATE": "PUBLIC",
          "TITLE": "SECURITY - OPC Server for AC 800M - Remote Code Execution Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "800xA, Control Software for AC 800M OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.0-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.1-x"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-1"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-2"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-3"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Control Builder Safe, version 1.x OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "5.1.1-1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Control Builder Safe, version 2.0 OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-1"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Compact Product Suite - Control and I/O OPC Server for AC 800M",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.0-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.1.1-x"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "6.0.0-x"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "ABB"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "ABB thanks William Knowles at Applied Risk for helping to identify the vulnerabilities and protecting our customers."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-732 Incorrect Permission Assignment for Critical Resource"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch",
              "refsource": "MISC",
              "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA000908\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Customers on version 5.1 or older are recommended to upgrade to a supported version that is not affected by this issue such as version 6.1 or later."
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
    "assignerShortName": "ABB",
    "cveId": "CVE-2021-22284",
    "datePublished": "2022-02-04T22:29:21.143636Z",
    "dateReserved": "2021-01-05T00:00:00",
    "dateUpdated": "2024-09-16T19:56:36.751Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}