Lucene search

K
vulnrichmentABBVULNRICHMENT:CVE-2024-0335
HistoryApr 03, 2024 - 6:53 p.m.

CVE-2024-0335 Malformed Packet Handling

2024-04-0318:53:25
CWE-23
ABB
github.com
1
malformed packet handling
abb vpni
symphony plus s+ operations
symphony plus s+ engineering
symphony plus s+ analyst

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may
be used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)

This issue affects Symphony Plus S+ Operations: from 3…0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:abb:symphony_plus_s\\+_operations:3.3:*:*:*:*:*:*:*"
    ],
    "vendor": "abb",
    "product": "symphony_plus_s\\+_operations",
    "versions": [
      {
        "status": "affected",
        "version": "3.3",
        "versionType": "custom",
        "lessThanOrEqual": "3.3_sp1_ru4"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:abb:symphony_plus_s\\+_operations:2.1:*:*:*:*:*:*:*"
    ],
    "vendor": "abb",
    "product": "symphony_plus_s\\+_operations",
    "versions": [
      {
        "status": "affected",
        "version": "2.1",
        "versionType": "custom",
        "lessThanOrEqual": "2.1_sp2_ru3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:abb:symphony_plus_s\\+_operations:2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "abb",
    "product": "symphony_plus_s\\+_operations",
    "versions": [
      {
        "status": "affected",
        "version": "2.0",
        "versionType": "custom",
        "lessThanOrEqual": "2.0_sp6_tc6"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:abb:symphony_plus_s\\+_engineering:*:*:*:*:*:*:*:*"
    ],
    "vendor": "abb",
    "product": "symphony_plus_s\\+_engineering",
    "versions": [
      {
        "status": "affected",
        "version": "2.1",
        "versionType": "custom",
        "lessThanOrEqual": "2.3_ru3"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:abb:symphony_plus_s\\+_analyst:*:*:*:*:*:*:*:*"
    ],
    "vendor": "abb",
    "product": "symphony_plus_s\\+_analyst",
    "versions": [
      {
        "status": "affected",
        "version": "7.0.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.0.2"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-0335