{ "id": "CVE-2024-0335", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-04-03T19:15:43.743", "lastModified": "2024-09-19T18:15:05.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may \nbe used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst)\n\n\nThis issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2." }, { "lang": "es", "value": "ABB ha identificado internamente una vulnerabilidad en la funci\u00f3n ABB VPNI del componente S+ Control API que puede ser utilizada por varios productos Symphony Plus (por ejemplo, S+ Operations, S+ Engineering y S+ Analyst). Este problema afecta a Symphony Plus S+ Operations: desde 3.. 0;0 a 3.3 SP1 RU4, de 2.1;0 a 2.1 SP2 RU3, de 2.0;0 a 2.0 SP6 TC6; Symphony Plus S+ Engineering: de 2.1 a 2.3 RU3; Symphony Plus S+ Analyst: desde 7.0.0.0 hasta 7.2.0.2." } ], "metrics": { "cvssMetricV31": [ { "source": "cybersecurity@ch.abb.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "cybersecurity@ch.abb.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-23" } ] } ], "references": [ { "url": "https://search.abb.com/library/Download.aspx?DocumentID=7PAA002536&LanguageCode=en&DocumentPartId=&Action=Launch", "source": "cybersecurity@ch.abb.com" } ] }