{"id": "CVE-2019-7225", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.8, "accessVector": "ADJACENT_NETWORK", "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 6.5, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2019-06-27T17:15:15.770", "references": [{"url": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2019/Jun/38", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2019/Jun/38", "tags": ["Mailing List", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/108922", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cve@mitre.org"}, {"url": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/", "tags": ["Exploit", "Patch", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.com/files/153397/ABB-HMI-Hardcoded-Credentials.html", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2019/Jun/38", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://seclists.org/fulldisclosure/2019/Jun/38", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/108922", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.darkmatter.ae/xen1thlabs/abb-hmi-hardcoded-credentials-vulnerability-xl-19-009/", "tags": ["Exploit", "Patch", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-798"}]}], "descriptions": [{"lang": "en", "value": "The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool \"Panel Builder 600\" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components."}, {"lang": "es", "value": "Los componentes HMI de ABB implementan cuentas administrativas ocultas que se utilizan durante la fase de aprovisionamiento de la interfaz HMI. Estas credenciales permiten que la herramienta de aprovisionamiento \"Panel Builder 600\" muestre una nueva interfaz y mapeo de etiquetas (bobinas MODBUS) en el HMI. Estas credenciales son la contrase\u00f1a idal123 para la cuenta IdalMaster y la contrase\u00f1a exor para la cuenta exor. Estas credenciales se utilizan tanto en HTTP (S) como en FTP. No hay opci\u00f3n para deshabilitar o cambiar estas credenciales no documentadas. Un atacante puede usar estas credenciales para iniciar sesi\u00f3n en ABB HMI para leer / escribir archivos de configuraci\u00f3n de HMI y tambi\u00e9n para restablecer el dispositivo. Esto afecta a HMI ABB CP635, HMIClient CP600, Panel Builder 600, servidor FTP IDAL, servidor HTTP IDAL y muchos otros componentes HMI."}], "lastModified": "2024-11-21T04:47:47.397", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E7480BA-5E10-4B70-82D7-755F09CAD291", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C49C0B1-EFAE-456C-9F8E-3E454B67110D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "876974B2-1EB6-41FC-B2F5-F0C3AE1F43BF", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "84DAB292-C0B2-4BD9-B806-ED12FC6C7A9E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B5BEC2B-5E6E-40F3-9E0B-487FB0098F35", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0CBD8A3B-CEE7-4FA3-959C-E828354B5A05"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29FE6356-0F2C-43A0-A4BB-E3C4F70A8171", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B60F253F-8042-4877-A519-C28459EF6555"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C7B5542-C2D2-4A29-9E40-C356883DA309", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77B6E1FC-6DFE-477E-AD49-CE37CEDF27CC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BC98A8D-6477-471B-8C4E-3F3CB5C6933F", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0559D243-6CCB-418F-A78D-3CB202262F38"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AB7EEE4-81B8-49C3-B482-243B62A9AEC7", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6D3AB80B-8AE2-4359-92B9-1465EB244029"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:pb610_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28D5DC67-1218-4AB3-974A-00E798B4BA3F", "versionEndIncluding": "2.8.0.3674", "versionStartIncluding": "1.91"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:pb610:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C6C4875D-C8BF-459E-8AB3-2CD8A0C6189B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp651-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25522616-145A-4A39-A8C9-3D7998C26F31", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp651-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "849EBA94-A50E-4CFF-8C79-EA7E7243EAC9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp661_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3832220C-02D2-48B9-8CD2-70FB5D1994D1", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp661:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B0691F9D-F6FE-40C2-A538-318F405F47DD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp661-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EECDAF37-075D-4AFB-B724-3EB7AA16A302", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp661-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC8588CE-588A-4C83-BBFE-502E72D006F1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp665_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1A0E882-1EE7-4FE1-AE59-35D02D0332D3", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp665:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF29C1B8-7CC4-4659-95BF-6B7B37AFC298"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp665-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67556F86-148E-4C10-87CE-658927A91FB2", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp665-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8068A1EE-D2A5-43E9-A297-47E9916E040A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp676_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15EA28D1-D2A1-4692-806D-1D0ADF53C762", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp676:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9C9F98FC-D563-4A3F-B189-BD2FED21039D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp676-web_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E7E19FD-9B92-410D-A023-FB68F14B0328", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp676-web:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF8D95A5-31B9-4366-BC56-489715ED7384"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:abb:cp651_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE6414E4-B285-44C3-8D08-DFAA475E121A", "versionEndIncluding": "1.76"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:abb:cp651:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4BD27ACE-A1F6-450C-9853-00F0D87A182A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}