A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
References
Link | Resource |
---|---|
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | Mitigation Technical Description Vendor Advisory |
Configurations
History
01 Aug 2023, 19:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:abb:zenon:*:*:*:*:*:*:*:* | |
References | (MISC) https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 - Mitigation, Technical Description, Vendor Advisory | |
First Time |
Abb
Abb zenon |
24 Jul 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-24 18:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-3321
Mitre link : CVE-2023-3321
CVE.ORG link : CVE-2023-3321
JSON object : View
Products Affected
abb
- zenon
CWE
CWE-15
External Control of System or Configuration Setting