Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rrrj-wqph-2cmr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.

EPSS

Процентиль: 25%
0.00085
Низкий

Дефекты

CWE-295
CWE-494

Связанные уязвимости

CVSS3: 8.3
nvd
больше 6 лет назад

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.

CVSS3: 8.3
fstec
больше 6 лет назад

Уязвимость интерфейса HMI панелей управления систем автоматизации ABB, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 25%
0.00085
Низкий

Дефекты

CWE-295
CWE-494