Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2024-3257
Vulnerability from csaf_certbund - Published: 2024-10-22 22:00 - Updated: 2024-10-24 22:00Summary
ABB Relion: Schwachstelle ermöglicht Privilegieneskalation und DoS
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Die Relion-Produktfamilie umfasst Produkte für Schutz, Steuerung, Messung und Überwachung von Energiesystemen für IEC- und ANSI-Anwendungen.
Angriff
Ein Angreifer aus einem angrenzenden Netzwerk kann eine Schwachstelle in ABB Relion Geräten ausnutzen, um seine Privilegien zu erhöhen oder einen Denial of Service zu verursachen.
Betroffene Betriebssysteme
- Sonstiges
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Relion-Produktfamilie umfasst Produkte f\u00fcr Schutz, Steuerung, Messung und \u00dcberwachung von Energiesystemen f\u00fcr IEC- und ANSI-Anwendungen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus einem angrenzenden Netzwerk kann eine Schwachstelle in ABB Relion Ger\u00e4ten ausnutzen, um seine Privilegien zu erh\u00f6hen oder einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3257 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3257.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3257 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3257"
},
{
"category": "external",
"summary": "ABB Security Advisory vom 2024-10-22",
"url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"source_lang": "en-US",
"title": "ABB Relion: Schwachstelle erm\u00f6glicht Privilegieneskalation und DoS",
"tracking": {
"current_release_date": "2024-10-24T22:00:00.000+00:00",
"generator": {
"date": "2024-10-25T10:36:16.423+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-3257",
"initial_release_date": "2024-10-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-24T22:00:00.000+00:00",
"number": "2",
"summary": "Hersteller ist ABB, nicht Hitachi Energy"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "ABB Relion",
"product": {
"name": "ABB Relion",
"product_id": "T026540",
"product_identification_helper": {
"cpe": "cpe:/h:abb:relion:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi Energy"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-8036",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in verschiedenen ABB Relion Ger\u00e4ten. Durch eine eine speziell gestaltete Firmware oder Konfiguration, die an einen betroffenen Systemknoten gesendet wird, kann dieser gestoppt, oder manipuliert werden. Ein privilegierter Angreifer aus einem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen oder seine Rechte zu erweitern. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T026540"
]
},
"release_date": "2024-10-22T22:00:00.000+00:00",
"title": "CVE-2024-8036"
}
]
}
CVE-2024-8036 (GCVE-0-2024-8036)
Vulnerability from cvelistv5 – Published: 2024-10-25 16:57 – Updated: 2024-10-30 17:20
VLAI?
EPSS
Title
Unauthorized Modifications of Firmware and Configuration
Summary
ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.
Severity ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ABB | Relion Protection Relays RE_611 IEC |
Affected:
1.0.0 , ≤ 1.0.4
(custom)
Affected: 2.0.0 , ≤ 2.0.4 (custom) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-8036",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-25T18:01:01.779059Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-25T18:01:19.582Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RE_611 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.4",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615 ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX615",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "PCL1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX610",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "1.1.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REX640",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.8",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.1.6",
"status": "affected",
"version": "1.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.2.3",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.3.4",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Substation Merging Unit SMU615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.0.3",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Smart Substation Control and Protection SSC600",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP1",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP2",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP3",
"versionType": "custom"
},
{
"status": "affected",
"version": "1.0 FP4",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REF615R ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "4.1.2",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RED615 IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.5",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series IEC",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.10",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.0.8",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.10",
"status": "affected",
"version": "4.1.9",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.0.17",
"status": "affected",
"version": "5.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.24",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series CN",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3..0.7",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.1.10",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.9",
"status": "affected",
"version": "4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.4",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays 615 series ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.0.5",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.1.1",
"status": "affected",
"version": "4.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "4.2.3",
"status": "affected",
"version": "4.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "5.1.3",
"status": "affected",
"version": "5.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays RER615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Relion Protection Relays REC615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.4",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.0.9",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RBX615",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.0",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RER620 ANSI",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.3",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "620 Series IEC/CN",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "2.0.13",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "2.1.16",
"status": "affected",
"version": "2.1.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RE_630",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.1.0 C5",
"status": "affected",
"version": "1.1.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.2.0 B8",
"status": "affected",
"version": "1.2.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "1.3.0 B1",
"status": "affected",
"version": "1.3.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "RIO600",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.8.8",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "COM600",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "3.3",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.4",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "4.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "4.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SPA ZC-400",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "Exx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Exxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xxxC",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "COM600F ANSI",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "4.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "5.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SPA ZC-402",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "Exxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Mxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "Sxxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xMxx",
"versionType": "custom"
},
{
"status": "affected",
"version": "xxxC",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REF542plus",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "R1.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R1.1",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5 ATEX",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.5 SP3",
"versionType": "custom"
},
{
"status": "affected",
"version": "R2.6",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0 SP1",
"versionType": "custom"
},
{
"status": "affected",
"version": "R3.0 SP3",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "SUE 3000",
"vendor": "ABB",
"versions": [
{
"status": "affected",
"version": "2.6 V4F07x",
"versionType": "custom"
},
{
"status": "affected",
"version": "3.0FP1 V4F11x",
"versionType": "custom"
},
{
"status": "affected",
"version": "V4D02x",
"versionType": "custom"
},
{
"status": "affected",
"version": "V4E0xx",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARG600/ARP600/ARR600/ARC600 single SIM",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "3.4.13",
"status": "affected",
"version": "3.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARG600/ARP600 dual SIM",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "3.4.13",
"status": "affected",
"version": "2.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ARM600",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "5.0.3",
"status": "affected",
"version": "4.x.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REC601/RER601",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2",
"status": "affected",
"version": "1.1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "REC603/RER603",
"vendor": "ABB",
"versions": [
{
"lessThanOrEqual": "1.2",
"status": "affected",
"version": "1.1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers."
}
],
"datePublic": "2024-10-21T08:50:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(247, 247, 247);\"\u003eABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.\u003c/span\u003e"
}
],
"value": "ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "IRRECOVERABLE",
"Safety": "PRESENT",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/S:P/AU:N/R:I/V:D/RE:H/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "HIGH"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-30T17:20:11.747Z",
"orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
"shortName": "ABB"
},
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unauthorized Modifications of Firmware and Configuration",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Please follow the guidelines in the following Product Advisory Note to improve the system security:\n\u003cbr\u003eGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\nSubstation Products (\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentPartId=\u0026amp;Action=Launch\"\u003ehttps://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026amp;LanguageCode=en\u0026amp;DocumentP...\u003c/a\u003e)\u003cbr\u003e"
}
],
"value": "Please follow the guidelines in the following Product Advisory Note to improve the system security:\n\nGuidelines to Prevent Unauthorized Modifications of Firmware and Configuration, ABB Digital\nSubstation Products ( https://search.abb.com/library/Download.aspx?DocumentID=2NGA002288\u0026LanguageCode=en\u0026DocumentP... https://search.abb.com/library/Download.aspx )"
}
],
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
"assignerShortName": "ABB",
"cveId": "CVE-2024-8036",
"datePublished": "2024-10-25T16:57:31.114Z",
"dateReserved": "2024-08-20T23:19:07.498Z",
"dateUpdated": "2024-10-30T17:20:11.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…