First published: Tue Dec 15 2020(Updated: )
In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB Symphony + Historian | =3.0 | |
ABB Symphony + Historian | =3.1 | |
ABB Symphony Plus Operations | =1.1 | |
ABB Symphony Plus Operations | =2.0 | |
ABB Symphony Plus Operations | =2.1-sp1 | |
ABB Symphony Plus Operations | =2.1-sp2 | |
ABB Symphony Plus Operations | =3.0 | |
ABB Symphony Plus Operations | =3.1 | |
ABB Symphony Plus Operations | =3.2 | |
ABB Symphony Plus Operations | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24674 is classified as a medium severity vulnerability due to the potential for Denial-of-Service (DoS) attacks and unauthorized privilege escalation.
To mitigate CVE-2020-24674, ensure that proper user permission checks are implemented and apply any available patches from the vendor.
CVE-2020-24674 affects specific versions of Abbey Symphony + Historian and Symphony + Operations ranging from 1.1 to 3.3.
Yes, CVE-2020-24674 could enable authenticated but unauthorized users to execute arbitrary code on the affected machines.
The potential impacts of CVE-2020-24674 include Denial-of-Service (DoS) attacks, privilege escalation, and unauthorized access to sensitive system functions.