mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
113 lines
5.1 KiB
JSON
113 lines
5.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-1258",
|
|
"ASSIGNER": "cybersecurity@ch.abb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
|
|
"cweId": "CWE-200"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "ABB",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Flow-X",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "0",
|
|
"version_value": "4.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754&LanguageCode=en&DocumentPartId=&Action=Launch",
|
|
"refsource": "MISC",
|
|
"name": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108467A9754&LanguageCode=en&DocumentPartId=&Action=Launch"
|
|
},
|
|
{
|
|
"url": "http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html",
|
|
"refsource": "MISC",
|
|
"name": "http://packetstormsecurity.com/files/173610/ABB-FlowX-4.00-Information-Disclosure.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "\n\nTo minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\nFlow-X flow computers in secure networks.\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\nsince version 3.2.0 (available as of September 2020).\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\nother devices, ABB recommends that customers change the usernames and passwords that are part of\nthe standard application and to use different usernames and password on different devices\n\n<br>"
|
|
}
|
|
],
|
|
"value": "\nTo minimize the risk of unauthorized access to sensitive information, ABB recommends to only operate\nFlow-X flow computers in secure networks.\nAdditionally, ABB recommends that HTTPS is used to communicate with the Flow-X web server. HTTPS\nsupport has been implemented since version 1.2.2 (available as of June 2016) and is enabled by default\nsince version 3.2.0 (available as of September 2020).\nTo minimize the risk of exposed security information on one device leading to unauthorized access on\nother devices, ABB recommends that customers change the usernames and passwords that are part of\nthe standard application and to use different usernames and password on different devices\n\n\n"
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "ABB would like to thank the following for working with us to help protect customers: Paul Smith of SCADAfence for reporting this vulnerability following coordinated disclosure"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |