Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9f9p-5j8g-3cmm

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder. The execution of the PLC application is not affected by this vulnerability. This issue affects ABB AC500 V2 products with onboard Ethernet.

The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder. The execution of the PLC application is not affected by this vulnerability. This issue affects ABB AC500 V2 products with onboard Ethernet.

EPSS

Процентиль: 68%
0.00555
Низкий

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
nvd
почти 5 лет назад

The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder. The execution of the PLC application is not affected by this vulnerability. This issue affects ABB AC500 V2 products with onboard Ethernet.

EPSS

Процентиль: 68%
0.00555
Низкий

Дефекты

CWE-400