First published: Tue Dec 22 2020(Updated: )
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Abb Symphony \+ Historian | =3.0 | |
Abb Symphony \+ Historian | =3.1 | |
Abb Symphony \+ Operations | =1.1 | |
Abb Symphony \+ Operations | =2.0 | |
Abb Symphony \+ Operations | =2.1-sp1 | |
Abb Symphony \+ Operations | =2.1-sp2 | |
Abb Symphony \+ Operations | =3.0 | |
Abb Symphony \+ Operations | =3.1 | |
Abb Symphony \+ Operations | =3.2 | |
Abb Symphony \+ Operations | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24673 is considered a critical vulnerability due to its potential for SQL injection attacks that can lead to unauthorized database access and manipulation.
To address CVE-2020-24673, update the affected ABB Symphony+ Operations and Symphony+ Historian software to the latest versions provided by ABB.
CVE-2020-24673 affects ABB Symphony+ Operations versions 1.1 to 3.3 and ABB Symphony+ Historian versions 3.0 and 3.1.
Exploitation of CVE-2020-24673 can lead to unauthorized data access, modification of database records, and execution of administrative operations on the database.
Yes, CVE-2020-24673 can be exploited with relative ease through SQL injection techniques, making immediate mitigation essential.