Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    MOSCOWTIMES    |    News from the land of vodka and Tetris    |    2,977 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 107 of 2,977    |
|    Sean Rima to All    |
|    ABB MV Drives    |
|    22 Apr 25 17:30:14    |
      MSGID: 2:263/1.0 55dccbcd       TZUTC: 0100       CHRS: CP850 2       ABB MV Drives              
2. RISK EVALUATION       Successful exploitation of these vulnerabilities could allow an attacker to       gain full access to the drive or cause a denial-of-service condition.        3. TECHNICAL DETAILS       3.1 AFFECTED PRODUCTS       ABB reports that the following MV Drives are affected by CODESYS RTS       (Runtime System) vulnerabilities:        
3.2 VULNERABILITY OVERVIEW       3.2.1 IMPROPER RESTRICTION OF       OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119       The CODESYS Control runtime system does not restrict the memory access. An       improper restriction of operations within the bounds of a memory buffer allows       an attacker with access to the drive with user privileges to gain full access       of the drive.        CVE-2022-4046 has been assigned to this vulnerability. A       CVSS v3.1 base score of 8.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H       ).        A CVSS v4 score has also been calculated for CVE-2022-4046. A base score of 8.7 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N       ).        3.2.2 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37550 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37550. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.3 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37549 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37549. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.4 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37548 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37548. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.5 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37547 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37547. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.6 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after a user successfully       authenticates, specially crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37546 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37546. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.7 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpApp component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37545 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37545. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.8 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpAppBP component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37556 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37556. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.9 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpAppBP component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37555 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37555. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.10 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpAppBP component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37554 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37554. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.11 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpAppBP component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37553 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37553. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.12 IMPROPER INPUT VALIDATION CWE-20       In multiple versions of various CODESYS products, after successful user       authentication, specifically crafted network communication requests with       inconsistent content can cause the CmpAppBP component to read from an invalid       internal address, potentially leading to a denial-of-service condition.        CVE-2023-37552 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37552. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.13 OUT-OF-BOUNDS WRITE CWE-787       After successful user authentication in multiple versions of various CODESYS       products, specifically crafted remote communication requests can cause the       CmpAppBP component to overwrite a heap-based buffer, potentially leading to a       denial-of-service condition.        CVE-2023-37557 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37557. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.14 IMPROPER INPUT VALIDATION CWE-20       After successful user authentication in multiple versions of various CODESYS       products, specifically crafted network communication requests with       inconsistent content can cause the CmpAppForce component to read from an       invalid internal address, potentially leading to a denial-of-service       condition.        CVE-2023-37559 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37559. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.2.15 IMPROPER INPUT VALIDATION CWE-20       After successful user authentication in multiple versions of various CODESYS       products, specifically crafted network communication requests with       inconsistent content can cause the CmpAppForce component to read from an       invalid internal address, potentially leading to a denial-of-service       condition.        CVE-2023-37558 has been assigned to this vulnerability. A       CVSS v3.1 base score of 6.5 has been calculated; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H       ).        A CVSS v4 score has also been calculated for CVE-2023-37558. A base score of 7.1 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N       ).        3.3 BACKGROUND       
3.4 RESEARCHER       ABB reported these vulnerabilities to CISA.        4. MITIGATIONS       ABB recommends users apply a firmware update as soon as possible to the   
   latest firmware, i.e. LAAAB v. 5.07 and higher, for the affected products. ABB   
   has addressed the CODESYS Runtime System vulnerabilities by disabling the IEC   
   online programming communication by default. As a result, CODESYS   
   communication between affected products and the ABB Automation Builder or ABB   
   Drive Application Builder tools is disabled. ABB recommends the following mitigating factors:
ABB proposes the following workaround to mitigate this threat for situations       where the above actions are not feasible:        
For more information, see ABB's security advisory 9AKK108470A9989.        ABB strongly recommends the following general cybersecurity practices for       any installation of software-related products (this list is non-       xhaustive):        
CISA recommends users take defensive measures to minimize the risk of       exploitation of these vulnerabilities. CISA reminds organizations to perform       proper impact analysis and risk assessment prior to deploying defensive       measures.        CISA also provides a section for control systems       security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense       best practices are available for reading and download, including Improving Industrial       Control Systems Cybersecurity with Defense-in-Depth Strategies.        CISA encourages organizations to implement recommended cybersecurity       strategies for proactive defense of ICS assets.        Additional mitigation guidance and recommended practices are publicly       available on the ICS webpage at cisa.gov in the technical information       paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and       Mitigation Strategies.        Organizations observing suspected malicious activity should follow       established internal procedures and report findings to CISA for tracking and       correlation against other incidents.        CISA also recommends users take the following measures to protect themselves       from social engineering attacks:        
No known public exploitation specifically targeting these vulnerabilities       has been reported to CISA at this time.        5. UPDATE HISTORY       
|
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca