{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2024-1913", "ASSIGNER": "cybersecurity@ch.abb.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "\nAn attacker who successfully exploited these vulnerabilities could cause the robot to stop, make the robot controller inaccessible, or execute arbitrary code.\u00a0\n\nThe vulnerability could potentially be exploited to perform unauthorized actions by an attacker. This vulnerability arises under specific condition when specially crafted message is processed by the system.\n\nBelow are\u00a0reported vulnerabilities in the Robot Ware versions.\n\n * IRC5- RobotWare 6 < 6.15.06 except 6.10.10, and 6.13.07 \n * OmniCore- RobotWare 7 < 7.14\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787 Out-of-bounds Write", "cweId": "CWE-787" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "ABB", "product": { "product_data": [ { "product_name": "RobotWare 6", "version": { "version_data": [ { "version_affected": "<", "version_name": "6.0.0", "version_value": "6.15.06 except 6.10.10 and 6.13.07" } ] } }, { "product_name": "RobotWare 7", "version": { "version_data": [ { "version_affected": "<", "version_name": "7.0", "version_value": "7.14" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=SI20330&LanguageCode=en&DocumentPartId=&Action=Launch", "refsource": "MISC", "name": "https://search.abb.com/library/Download.aspx?DocumentID=SI20330&LanguageCode=en&DocumentPartId=&Action=Launch" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "discovery": "UNKNOWN" }, "credits": [ { "lang": "en", "value": "ABB thanks Yuncheng Wang, Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China for responsibly reporting the vulnerabilities and working with us as we addressed them" } ], "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" } ] } }