CVE-2023-1258 (GCVE-0-2023-1258)

Vulnerability from cvelistv5 – Published: 2023-03-31 07:56 – Updated: 2025-02-13 16:39
VLAI?
Title
Flow-X disclosure of sensitive information to unauthenticated users
Summary
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
ABB
Impacted products
Vendor Product Version
ABB Flow-X Affected: 0 , < 4.0 (semver)
Create a notification for this product.
Date Public ?
2023-03-31 08:00
Credits
ABB would like to thank the following for working with us to help protect customers: Paul Smith of SCADAfence for reporting this vulnerability following coordinated disclosure
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:40:59.772Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1258",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-11T18:42:33.492290Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-11T18:42:39.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "web service"
          ],
          "packageName": "firmware",
          "platforms": [
            "Flow-X embedded hardware"
          ],
          "product": "Flow-X",
          "vendor": "ABB",
          "versions": [
            {
              "lessThan": "4.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "ABB would like to thank the following for working with us to help protect customers: Paul Smith of SCADAfence for reporting this vulnerability following coordinated disclosure"
        }
      ],
      "datePublic": "2023-03-31T08:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.\u003cp\u003eThis issue affects Flow-X: before 4.0.\u003c/p\u003e"
            }
          ],
          "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-169",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-169 Footprinting"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-20T17:06:55.424Z",
        "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
        "shortName": "ABB"
      },
      "references": [
        {
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        },
        {
          "url": "http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Flow-X disclosure of sensitive information to unauthenticated users",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "To minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\nFlow-X flow computers in secure networks.\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\nsince version 3.2.0 (available as of September 2020).\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\nother devices, ABB recommends that customers change the usernames and passwords that are part of\nthe standard application and to use different usernames and password on different devices\n\n\u003cbr\u003e"
            }
          ],
          "value": "To minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\nFlow-X flow computers in secure networks.\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\nsince version 3.2.0 (available as of September 2020).\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\nother devices, ABB recommends that customers change the usernames and passwords that are part of\nthe standard application and to use different usernames and password on different devices"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
    "assignerShortName": "ABB",
    "cveId": "CVE-2023-1258",
    "datePublished": "2023-03-31T07:56:05.133Z",
    "dateReserved": "2023-03-07T16:57:05.254Z",
    "dateUpdated": "2025-02-13T16:39:19.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2023-1258",
      "date": "2026-04-25",
      "epss": "0.13178",
      "percentile": "0.94156"
    },
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/m_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"1DCEC272-343C-4D88-9ED6-A3D5DC25A2FB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61233B04-F1F2-4C5B-A260-460D30CFC162\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/c_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"406419A5-33DC-489D-A3DC-2736C8C788B3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4F273C0-E67E-4F69-8F2C-D3F498755DDA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/k_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"1A769914-724B-4D91-BF2C-A646EA0FF1A8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2824256-84EE-45A6-9794-10F4AA580D11\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/s_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"7C079FE6-59A6-4220-B7FE-7AA47244C39C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15B144BE-2159-48A9-A097-599BDE51E8B2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/p_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"794E908F-D650-4E92-898E-A4FCAD199744\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B7823F0-C4B5-4A8F-8429-58CE14E46CE9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x_r_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"C75BB6AE-9113-43AA-AAAC-5D0CE4160F69\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x_r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E5A008E-37C8-46A4-AD6C-3E8BCD555B79\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/t_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"2C3CD012-F79D-4D51-85B2-90F10C11E5BE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C96DF884-7DF2-46AB-B5C5-6BB301B030C3\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:flow-x\\\\/web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.2.6\", \"matchCriteriaId\": \"1845A152-6B8A-4B12-82BB-0CBE39D8738E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:flow-x\\\\/web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90F9782F-E7B8-45FC-8CBD-316ED3A7D37E\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.\\n\\n\"}]",
      "id": "CVE-2023-1258",
      "lastModified": "2024-11-21T07:38:46.780",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cybersecurity@ch.abb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
      "published": "2023-03-31T08:15:06.397",
      "references": "[{\"url\": \"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\", \"source\": \"cybersecurity@ch.abb.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\", \"source\": \"cybersecurity@ch.abb.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cybersecurity@ch.abb.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"cybersecurity@ch.abb.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-1258\",\"sourceIdentifier\":\"cybersecurity@ch.abb.com\",\"published\":\"2023-03-31T08:15:06.397\",\"lastModified\":\"2025-02-13T17:15:57.873\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/m_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"1DCEC272-343C-4D88-9ED6-A3D5DC25A2FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61233B04-F1F2-4C5B-A260-460D30CFC162\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/c_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"406419A5-33DC-489D-A3DC-2736C8C788B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F273C0-E67E-4F69-8F2C-D3F498755DDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/k_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"1A769914-724B-4D91-BF2C-A646EA0FF1A8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2824256-84EE-45A6-9794-10F4AA580D11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/s_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"7C079FE6-59A6-4220-B7FE-7AA47244C39C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B144BE-2159-48A9-A097-599BDE51E8B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/p_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"794E908F-D650-4E92-898E-A4FCAD199744\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B7823F0-C4B5-4A8F-8429-58CE14E46CE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x_r_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"C75BB6AE-9113-43AA-AAAC-5D0CE4160F69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x_r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5A008E-37C8-46A4-AD6C-3E8BCD555B79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/t_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"2C3CD012-F79D-4D51-85B2-90F10C11E5BE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C96DF884-7DF2-46AB-B5C5-6BB301B030C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:flow-x\\\\/web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.6\",\"matchCriteriaId\":\"1845A152-6B8A-4B12-82BB-0CBE39D8738E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:flow-x\\\\/web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90F9782F-E7B8-45FC-8CBD-316ED3A7D37E\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\",\"source\":\"cybersecurity@ch.abb.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"cybersecurity@ch.abb.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T05:40:59.772Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-1258\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-11T18:42:33.492290Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-11T18:42:25.331Z\"}}], \"cna\": {\"title\": \"Flow-X disclosure of sensitive information to unauthenticated users\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"ABB would like to thank the following for working with us to help protect customers: Paul Smith of SCADAfence for reporting this vulnerability following coordinated disclosure\"}], \"impacts\": [{\"capecId\": \"CAPEC-169\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-169 Footprinting\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ABB\", \"modules\": [\"web service\"], \"product\": \"Flow-X\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"4.0\", \"versionType\": \"semver\"}], \"platforms\": [\"Flow-X embedded hardware\"], \"packageName\": \"firmware\", \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-03-31T08:00:00.000Z\", \"references\": [{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\"}, {\"url\": \"http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"To minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\\nFlow-X flow computers in secure networks.\\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\\nsince version 3.2.0 (available as of September 2020).\\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\\nother devices, ABB recommends that customers change the usernames and passwords that are part of\\nthe standard application and to use different usernames and password on different devices\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"To minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\\nFlow-X flow computers in secure networks.\\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\\nsince version 3.2.0 (available as of September 2020).\\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\\nother devices, ABB recommends that customers change the usernames and passwords that are part of\\nthe standard application and to use different usernames and password on different devices\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.\u003cp\u003eThis issue affects Flow-X: before 4.0.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"shortName\": \"ABB\", \"dateUpdated\": \"2023-07-20T17:06:55.424Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-1258\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T16:39:19.647Z\", \"dateReserved\": \"2023-03-07T16:57:05.254Z\", \"assignerOrgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"datePublished\": \"2023-03-31T07:56:05.133Z\", \"assignerShortName\": \"ABB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…