A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
References
Link | Resource |
---|---|
https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 | Mitigation Technical Description Vendor Advisory |
Configurations
History
01 Aug 2023, 21:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Abb
Abb zenon |
|
CPE | cpe:2.3:a:abb:zenon:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 - Mitigation, Technical Description, Vendor Advisory |
24 Jul 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-24 18:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-3324
Mitre link : CVE-2023-3324
CVE.ORG link : CVE-2023-3324
JSON object : View
Products Affected
abb
- zenon
CWE
CWE-502
Deserialization of Untrusted Data