First published: Tue Dec 22 2020(Updated: )
In Symphony Plus Operations and Symphony Plus Historian, some services can be vulnerable to privilege escalation attacks. An unprivileged (but authenticated) user could execute arbitrary code and result in privilege escalation, depending on the user that the service runs as.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB Symphony + Historian | =3.0 | |
ABB Symphony + Historian | =3.1 | |
ABB Symphony Plus Operations | =1.1 | |
ABB Symphony Plus Operations | =2.0 | |
ABB Symphony Plus Operations | =2.1-sp1 | |
ABB Symphony Plus Operations | =2.1-sp2 | |
ABB Symphony Plus Operations | =3.0 | |
ABB Symphony Plus Operations | =3.1 | |
ABB Symphony Plus Operations | =3.2 | |
ABB Symphony Plus Operations | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24676 has a medium severity level due to its potential for privilege escalation.
To remediate CVE-2020-24676, update the affected versions of Symphony Plus Operations and Symphony Plus Historian to the latest patched versions.
CVE-2020-24676 affects Symphony Plus Operations versions 1.1, 2.0, 2.1 (SP1 and SP2), 3.0, 3.1, 3.2, and 3.3, as well as Symphony Plus Historian versions 3.0 and 3.1.
Any organization using the specified versions of Symphony Plus Operations and Symphony Plus Historian is at risk of exploitation due to CVE-2020-24676.
CVE-2020-24676 enables unprivileged but authenticated users to execute arbitrary code, leading to privilege escalation.