CVE-2019-7225 (GCVE-0-2019-7225)
Vulnerability from cvelistv5 – Published: 2019-06-27 16:38 – Updated: 2024-08-04 20:46
VLAI?
Summary
The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T20:46:45.863Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190624 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/"
},
{
"name": "20190620 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"name": "108922",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/108922"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool \"Panel Builder 600\" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-07-01T06:06:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20190624 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/"
},
{
"name": "20190620 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"name": "108922",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/108922"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-7225",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool \"Panel Builder 600\" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190624 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"name": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html"
},
{
"name": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/",
"refsource": "MISC",
"url": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/"
},
{
"name": "20190620 XL-19-009 - ABB HMI Hardcoded Credentials Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2019/Jun/38"
},
{
"name": "108922",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/108922"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-7225",
"datePublished": "2019-06-27T16:38:39",
"dateReserved": "2019-01-30T00:00:00",
"dateUpdated": "2024-08-04T20:46:45.863Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"1E7480BA-5E10-4B70-82D7-755F09CAD291\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C49C0B1-EFAE-456C-9F8E-3E454B67110D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"876974B2-1EB6-41FC-B2F5-F0C3AE1F43BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84DAB292-C0B2-4BD9-B806-ED12FC6C7A9E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"3B5BEC2B-5E6E-40F3-9E0B-487FB0098F35\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CBD8A3B-CEE7-4FA3-959C-E828354B5A05\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"29FE6356-0F2C-43A0-A4BB-E3C4F70A8171\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B60F253F-8042-4877-A519-C28459EF6555\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"7C7B5542-C2D2-4A29-9E40-C356883DA309\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77B6E1FC-6DFE-477E-AD49-CE37CEDF27CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"8BC98A8D-6477-471B-8C4E-3F3CB5C6933F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0559D243-6CCB-418F-A78D-3CB202262F38\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"5AB7EEE4-81B8-49C3-B482-243B62A9AEC7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D3AB80B-8AE2-4359-92B9-1465EB244029\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:pb610_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.91\", \"versionEndIncluding\": \"2.8.0.3674\", \"matchCriteriaId\": \"28D5DC67-1218-4AB3-974A-00E798B4BA3F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:pb610:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6C4875D-C8BF-459E-8AB3-2CD8A0C6189B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp651-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"25522616-145A-4A39-A8C9-3D7998C26F31\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp651-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"849EBA94-A50E-4CFF-8C79-EA7E7243EAC9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp661_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"3832220C-02D2-48B9-8CD2-70FB5D1994D1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp661:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0691F9D-F6FE-40C2-A538-318F405F47DD\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp661-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"EECDAF37-075D-4AFB-B724-3EB7AA16A302\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp661-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC8588CE-588A-4C83-BBFE-502E72D006F1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp665_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"E1A0E882-1EE7-4FE1-AE59-35D02D0332D3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp665:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF29C1B8-7CC4-4659-95BF-6B7B37AFC298\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp665-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"67556F86-148E-4C10-87CE-658927A91FB2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp665-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8068A1EE-D2A5-43E9-A297-47E9916E040A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp676_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"15EA28D1-D2A1-4692-806D-1D0ADF53C762\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp676:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C9F98FC-D563-4A3F-B189-BD2FED21039D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp676-web_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"5E7E19FD-9B92-410D-A023-FB68F14B0328\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp676-web:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF8D95A5-31B9-4366-BC56-489715ED7384\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:abb:cp651_firmware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.76\", \"matchCriteriaId\": \"AE6414E4-B285-44C3-8D08-DFAA475E121A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:abb:cp651:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD27ACE-A1F6-450C-9853-00F0D87A182A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool \\\"Panel Builder 600\\\" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.\"}, {\"lang\": \"es\", \"value\": \"Los componentes HMI de ABB implementan cuentas administrativas ocultas que se utilizan durante la fase de aprovisionamiento de la interfaz HMI. Estas credenciales permiten que la herramienta de aprovisionamiento \\\"Panel Builder 600\\\" muestre una nueva interfaz y mapeo de etiquetas (bobinas MODBUS) en el HMI. Estas credenciales son la contrase\\u00f1a idal123 para la cuenta IdalMaster y la contrase\\u00f1a exor para la cuenta exor. Estas credenciales se utilizan tanto en HTTP (S) como en FTP. No hay opci\\u00f3n para deshabilitar o cambiar estas credenciales no documentadas. Un atacante puede usar estas credenciales para iniciar sesi\\u00f3n en ABB HMI para leer / escribir archivos de configuraci\\u00f3n de HMI y tambi\\u00e9n para restablecer el dispositivo. Esto afecta a HMI ABB CP635, HMIClient CP600, Panel Builder 600, servidor FTP IDAL, servidor HTTP IDAL y muchos otros componentes HMI.\"}]",
"id": "CVE-2019-7225",
"lastModified": "2024-11-21T04:47:47.397",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.8, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-06-27T17:15:15.770",
"references": "[{\"url\": \"http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/38\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/38\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/108922\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/38\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2019/Jun/38\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/108922\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-798\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-7225\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-06-27T17:15:15.770\",\"lastModified\":\"2024-11-21T04:47:47.397\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool \\\"Panel Builder 600\\\" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.\"},{\"lang\":\"es\",\"value\":\"Los componentes HMI de ABB implementan cuentas administrativas ocultas que se utilizan durante la fase de aprovisionamiento de la interfaz HMI. Estas credenciales permiten que la herramienta de aprovisionamiento \\\"Panel Builder 600\\\" muestre una nueva interfaz y mapeo de etiquetas (bobinas MODBUS) en el HMI. Estas credenciales son la contrase\u00f1a idal123 para la cuenta IdalMaster y la contrase\u00f1a exor para la cuenta exor. Estas credenciales se utilizan tanto en HTTP (S) como en FTP. No hay opci\u00f3n para deshabilitar o cambiar estas credenciales no documentadas. Un atacante puede usar estas credenciales para iniciar sesi\u00f3n en ABB HMI para leer / escribir archivos de configuraci\u00f3n de HMI y tambi\u00e9n para restablecer el dispositivo. Esto afecta a HMI ABB CP635, HMIClient CP600, Panel Builder 600, servidor FTP IDAL, servidor HTTP IDAL y muchos otros componentes HMI.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":5.8,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"1E7480BA-5E10-4B70-82D7-755F09CAD291\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C49C0B1-EFAE-456C-9F8E-3E454B67110D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"876974B2-1EB6-41FC-B2F5-F0C3AE1F43BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84DAB292-C0B2-4BD9-B806-ED12FC6C7A9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"3B5BEC2B-5E6E-40F3-9E0B-487FB0098F35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBD8A3B-CEE7-4FA3-959C-E828354B5A05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"29FE6356-0F2C-43A0-A4BB-E3C4F70A8171\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B60F253F-8042-4877-A519-C28459EF6555\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"7C7B5542-C2D2-4A29-9E40-C356883DA309\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77B6E1FC-6DFE-477E-AD49-CE37CEDF27CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"8BC98A8D-6477-471B-8C4E-3F3CB5C6933F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0559D243-6CCB-418F-A78D-3CB202262F38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"5AB7EEE4-81B8-49C3-B482-243B62A9AEC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3AB80B-8AE2-4359-92B9-1465EB244029\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:pb610_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.91\",\"versionEndIncluding\":\"2.8.0.3674\",\"matchCriteriaId\":\"28D5DC67-1218-4AB3-974A-00E798B4BA3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:pb610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C4875D-C8BF-459E-8AB3-2CD8A0C6189B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp651-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"25522616-145A-4A39-A8C9-3D7998C26F31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp651-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"849EBA94-A50E-4CFF-8C79-EA7E7243EAC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp661_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"3832220C-02D2-48B9-8CD2-70FB5D1994D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp661:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0691F9D-F6FE-40C2-A538-318F405F47DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp661-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"EECDAF37-075D-4AFB-B724-3EB7AA16A302\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp661-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8588CE-588A-4C83-BBFE-502E72D006F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp665_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"E1A0E882-1EE7-4FE1-AE59-35D02D0332D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp665:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF29C1B8-7CC4-4659-95BF-6B7B37AFC298\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp665-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"67556F86-148E-4C10-87CE-658927A91FB2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp665-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8068A1EE-D2A5-43E9-A297-47E9916E040A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp676_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"15EA28D1-D2A1-4692-806D-1D0ADF53C762\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp676:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9F98FC-D563-4A3F-B189-BD2FED21039D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp676-web_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"5E7E19FD-9B92-410D-A023-FB68F14B0328\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp676-web:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8D95A5-31B9-4366-BC56-489715ED7384\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:cp651_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.76\",\"matchCriteriaId\":\"AE6414E4-B285-44C3-8D08-DFAA475E121A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:cp651:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD27ACE-A1F6-450C-9853-00F0D87A182A\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/38\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/38\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/108922\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2019/Jun/38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/108922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…