First published: Tue Dec 22 2020(Updated: )
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Abb Symphony \+ Historian | =3.0 | |
Abb Symphony \+ Historian | =3.1 | |
Abb Symphony \+ Operations | =1.1 | |
Abb Symphony \+ Operations | =2.0 | |
Abb Symphony \+ Operations | =2.1-sp1 | |
Abb Symphony \+ Operations | =2.1-sp2 | |
Abb Symphony \+ Operations | =3.0 | |
Abb Symphony \+ Operations | =3.1 | |
Abb Symphony \+ Operations | =3.2 | |
Abb Symphony \+ Operations | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.