In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/100260 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-05 | Mitigation Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/100260 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-17-222-05 | Mitigation Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/100260 - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-17-222-05 - Mitigation, Third Party Advisory, US Government Resource |
Information
Published : 2018-05-24 20:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9664
Mitre link : CVE-2017-9664
CVE.ORG link : CVE-2017-9664
JSON object : View
Products Affected
abb
- srea-50_firmware
- srea-01
- srea-01_firmware
- srea-50