First published: Tue Mar 25 2025(Updated: )
An Exposure of Sensitive System Information to an Unauthorized Control Sphere and Initialization of a Resource with an Insecure Default vulnerability in the SNMP component of B&R APROL <4.4-00P5 may allow an unauthenticated adjacent-based attacker to read and alter configuration using SNMP.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
B&R APROL Web Portal | <4.4-00P5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8313 is classified as a high severity vulnerability due to the potential for unauthorized access to sensitive system information.
CVE-2024-8313 affects the B&R APROL versions prior to 4.4-00P5.
To mitigate CVE-2024-8313, update your B&R APROL software to version 4.4-00P5 or later to close the vulnerability.
The potential impacts of CVE-2024-8313 include unauthorized access to and modification of configuration settings within the B&R APROL system.
CVE-2024-8313 cannot be exploited remotely, as it requires an adjacent-based attacker to exploit the vulnerability.