CVE-2024-8036 (GCVE-0-2024-8036)
Vulnerability from cvelistv5 – Published: 2024-10-25 16:57 – Updated: 2024-10-30 17:20
VLAI?
Title
Unauthorized Modifications of Firmware and Configuration
Summary
ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.
Severity ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ABB | Relion Protection Relays RE_611 IEC |
Affected:
1.0.0 , ≤ 1.0.4
(custom)
Affected: 2.0.0 , ≤ 2.0.4 (custom) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8036",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-25T18:01:01.779059Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-25T18:01:19.582Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RE_611 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.4",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615 ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX615",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "PCL1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX610",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "1.1.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX640",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.8",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.1.6",
"status": "affected",
"version": "1.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.2.3",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.3.4",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Substation Merging Unit SMU615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.3",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Smart Substation Control and Protection SSC600",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP1",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP2",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP3",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP4",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615R ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "4.1.2",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RED615 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.5",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.10",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.0.8",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.10",
"status": "affected",
"version": "4.1.9",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.0.17",
"status": "affected",
"version": "5.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.24",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series CN",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3..0.7",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.1.10",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.9",
"status": "affected",
"version": "4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.4",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.0.5",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.1",
"status": "affected",
"version": "4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.2.3",
"status": "affected",
"version": "4.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.3",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RER615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REC615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBX615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RER620 ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.3",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "620 Series IEC/CN",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.13",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.1.16",
"status": "affected",
"version": "2.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RE_630",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.0 C5",
"status": "affected",
"version": "1.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.2.0 B8",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.3.0 B1",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RIO600",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.8.8",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "COM600",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "3.3",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.4",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "4.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "4.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SPA ZC-400",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "Exx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Exxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xxxC",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "COM600F ANSI",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "4.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SPA ZC-402",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "Exxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xxxC",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REF542plus",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "R1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R1.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5 ATEX",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5 SP3",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.6",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0 SP1",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0 SP3",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SUE 3000",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "2.6 V4F07x",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.0FP1 V4F11x",
"versionType": "custom"
},
{
"status": "affected",
"version": "V4D02x",
"versionType": "custom"
},
{
"status": "affected",
"version": "V4E0xx",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARG600/ARP600/ARR600/ARC600 single SIM",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "3.4.13",
"status": "affected",
"version": "3.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARG600/ARP600 dual SIM",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "3.4.13",
"status": "affected",
"version": "2.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARM600",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "5.0.3",
"status": "affected",
"version": "4.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REC601/RER601",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2",
"status": "affected",
"version": "1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REC603/RER603",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2",
"status": "affected",
"version": "1.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers."
}
],
"datePublic": "2024-10-21T08:50:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(247, 247, 247);\"\u003eABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\u003c/span\u003e"
}
],
"value": "ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "IRRECOVERABLE",
"Safety": "PRESENT",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:N/R:I/V:D/RE:H/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-30T17:20:11.747Z",
"orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
"shortName": "ABB"
},
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unauthorized Modifications of Firmware and Configuration",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Please follow the guidelines in the following Product Advisory Note to improve the system security:\n\u003cbr\u003eGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\nSubstation Products (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentPartId=\u0026amp;Action=Launch\"\u003ehttps://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentP...\u003c/a\u003e)\u003cbr\u003e"
}
],
"value": "Please follow the guidelines in the following Product Advisory Note to improve the system security:\n\nGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\nSubstation Products ( https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026LanguageCode=en\u0026DocumentP... https://search.abb.com/library/Download.aspx )"
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
"assignerShortName": "ABB",
"cveId": "CVE-2024-8036",
"datePublished": "2024-10-25T16:57:31.114Z",
"dateReserved": "2024-08-20T23:19:07.498Z",
"dateUpdated": "2024-10-30T17:20:11.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\"}, {\"lang\": \"es\", \"value\": \"ABB tiene conocimiento de vulnerabilidades notificadas de forma privada en las versiones de productos a las que se hace referencia en este CVE. Un atacante podr\\u00eda aprovechar estas vulnerabilidades enviando un firmware o una configuraci\\u00f3n especialmente manipulados al nodo del sistema, lo que provocar\\u00eda que el nodo se detuviera, se volviera inaccesible o permitiera al atacante tomar el control del nodo.\"}]",
"id": "CVE-2024-8036",
"lastModified": "2024-10-30T18:15:07.960",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"cybersecurity@ch.abb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:I/V:D/RE:H/U:Amber\", \"baseScore\": 4.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"PASSIVE\", \"vulnerableSystemConfidentiality\": \"LOW\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"HIGH\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"PRESENT\", \"automatable\": \"NO\", \"recovery\": \"IRRECOVERABLE\", \"valueDensity\": \"DIFFUSE\", \"vulnerabilityResponseEffort\": \"HIGH\", \"providerUrgency\": \"AMBER\"}}], \"cvssMetricV31\": [{\"source\": \"cybersecurity@ch.abb.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H\", \"baseScore\": 5.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.4, \"impactScore\": 5.5}]}",
"published": "2024-10-25T17:15:04.963",
"references": "[{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\", \"source\": \"cybersecurity@ch.abb.com\"}]",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"cybersecurity@ch.abb.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-347\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-8036\",\"sourceIdentifier\":\"cybersecurity@ch.abb.com\",\"published\":\"2024-10-25T17:15:04.963\",\"lastModified\":\"2024-10-30T18:15:07.960\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\"},{\"lang\":\"es\",\"value\":\"ABB tiene conocimiento de vulnerabilidades notificadas de forma privada en las versiones de productos a las que se hace referencia en este CVE. Un atacante podr\u00eda aprovechar estas vulnerabilidades enviando un firmware o una configuraci\u00f3n especialmente manipulados al nodo del sistema, lo que provocar\u00eda que el nodo se detuviera, se volviera inaccesible o permitiera al atacante tomar el control del nodo.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:I/V:D/RE:H/U:Amber\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"PRESENT\",\"Automatable\":\"NO\",\"Recovery\":\"IRRECOVERABLE\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"HIGH\",\"providerUrgency\":\"AMBER\"}}],\"cvssMetricV31\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.4,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"references\":[{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"cybersecurity@ch.abb.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-8036\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-25T18:01:01.779059Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-25T18:01:11.669Z\"}}], \"cna\": {\"title\": \"Unauthorized Modifications of Firmware and Configuration\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"PRESENT\", \"version\": \"4.0\", \"Recovery\": \"IRRECOVERABLE\", \"baseScore\": 4.6, \"Automatable\": \"NO\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:N/R:I/V:D/RE:H/U:Amber\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays RE_611 IEC\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.0.4\"}, {\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.4\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REF615 IEC\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.2.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REF615 ANSI\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REX615\", \"versions\": [{\"status\": \"affected\", \"version\": \"PCL1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REX610\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.1.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.2.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REX640\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.0.8\"}, {\"status\": \"affected\", \"version\": \"1.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.6\"}, {\"status\": \"affected\", \"version\": \"1.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.2.3\"}, {\"status\": \"affected\", \"version\": \"1.3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.3.4\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Substation Merging Unit SMU615\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.0.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Smart Substation Control and Protection SSC600\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0 FP1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0 FP2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0 FP3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"1.0 FP4\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REF615R ANSI\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.1.2\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays RED615 IEC\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.5\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays 615 series IEC\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.9\"}, {\"status\": \"affected\", \"version\": \"3.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.0.10\"}, {\"status\": \"affected\", \"version\": \"4.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.0.8\"}, {\"status\": \"affected\", \"version\": \"4.1.9\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.1.10\"}, {\"status\": \"affected\", \"version\": \"5.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.0.17\"}, {\"status\": \"affected\", \"version\": \"5.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.1.24\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays 615 series CN\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.9\"}, {\"status\": \"affected\", \"version\": \"3.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3..0.7\"}, {\"status\": \"affected\", \"version\": \"3.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.1.10\"}, {\"status\": \"affected\", \"version\": \"4.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.1.9\"}, {\"status\": \"affected\", \"version\": \"5.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.1.4\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays 615 series ANSI\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.9\"}, {\"status\": \"affected\", \"version\": \"4.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.0.5\"}, {\"status\": \"affected\", \"version\": \"4.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.1.1\"}, {\"status\": \"affected\", \"version\": \"4.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"4.2.3\"}, {\"status\": \"affected\", \"version\": \"5.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.1.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays RER615\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.4\"}, {\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.9\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"Relion Protection Relays REC615\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.4\"}, {\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.9\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"RBX615\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.0\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"RER620 ANSI\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"620 Series IEC/CN\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.0.13\"}, {\"status\": \"affected\", \"version\": \"2.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.1.16\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"RE_630\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.1.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.1.0 C5\"}, {\"status\": \"affected\", \"version\": \"1.2.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.2.0 B8\"}, {\"status\": \"affected\", \"version\": \"1.3.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.3.0 B1\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"RIO600\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.8.8\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"COM600\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.4\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"4.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"5.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"5.1\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"SPA ZC-400\", \"versions\": [{\"status\": \"affected\", \"version\": \"Exx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Mxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Sxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"xMx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Exxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Mxxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Sxxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"xMxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"xxxC\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"COM600F ANSI\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"5.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"SPA ZC-402\", \"versions\": [{\"status\": \"affected\", \"version\": \"Exxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Mxxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Sxxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"xMxx\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"xxxC\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"REF542plus\", \"versions\": [{\"status\": \"affected\", \"version\": \"R1.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R1.1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R2.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R2.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R2.5 ATEX\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R2.5 SP3\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R2.6\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R3.0\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R3.0 SP1\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"R3.0 SP3\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"SUE 3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.6 V4F07x\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"3.0FP1 V4F11x\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"V4D02x\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"V4E0xx\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"ARG600/ARP600/ARR600/ARC600 single SIM\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.x.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.4.13\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"ARG600/ARP600 dual SIM\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.x.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"3.4.13\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"ARM600\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.x.x\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"5.0.3\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"REC601/RER601\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.2\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"REC603/RER603\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"1.2\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-10-21T08:50:00.000Z\", \"references\": [{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Please follow the guidelines in the following Product Advisory Note to improve the system security:\\n\\nGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\\nSubstation Products ( https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026LanguageCode=en\u0026DocumentP... https://search.abb.com/library/Download.aspx )\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Please follow the guidelines in the following Product Advisory Note to improve the system security:\\n\u003cbr\u003eGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\\nSubstation Products (\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentPartId=\u0026amp;Action=Launch\\\"\u003ehttps://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentP...\u003c/a\u003e)\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(247, 247, 247);\\\"\u003eABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-347\", \"description\": \"CWE-347 Improper Verification of Cryptographic Signature\"}]}], \"providerMetadata\": {\"orgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"shortName\": \"ABB\", \"dateUpdated\": \"2024-10-30T17:20:11.747Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-8036\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-30T17:20:11.747Z\", \"dateReserved\": \"2024-08-20T23:19:07.498Z\", \"assignerOrgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"datePublished\": \"2024-10-25T16:57:31.114Z\", \"assignerShortName\": \"ABB\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…