cve/2020/CVE-2020-24685.md

19 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-24685](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24685)
![](https://img.shields.io/static/v1?label=Product&message=AC500%20V2%20products%20with%20onboard%20Ethernet&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20unauthenticated%20specially%20crafted%20packet%20sent%20by%20an%20attacker%20over%20the%20network%20will%20cause%20a%20denial-of-service%20(DoS)%20vulnerability.%20Vulnerability%20allows%20attacker%20to%20stop%20the%20PLC.%20After%20stopping%20(ERR%20LED%20flashing%20red)%2C%20physical%20access%20to%20the%20PLC%20is%20required%20in%20order%20to%20restart%20the%20application.&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value&color=brighgreen)
### Description
An unauthenticated specially crafted packet sent by an attacker over the network will cause a denial-of-service (DoS) vulnerability. Vulnerability allows attacker to stop the PLC. After stopping (ERR LED flashing red), physical access to the PLC is required in order to restart the application. This issue affects: ABB AC500 V2 products with onboard Ethernet version 2.8.4 and prior versions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/yossireuven/Publications