QID 591038

Date Published: 2022-09-15

QID 591038: ABB Zenon Log Server file access control Multiple Vulnerabilities (ABBVREP0079)

AFFECTED PRODUCTS
Zenon All versions up to 8.20

QID Detection Logic (Authenticated)
QID checks for the Vulnerable version using windows registry keys

An attacker who successfully exploited the CVE-2022-34836 vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc. The attacker may also craft special private protocol information and perform random file readings on the Zenon system. However, a Zenon system can mitigate the risk by following better control of the access permission and restricting the access only to legitimate clients by using the inbound firewall rules on the Zenon log service An attacker who successfully exploited CVE-2022-34837 may add more network clients that may monitor various activities of the Zenon. However, by reducing the access controls to the network password ini file the risk of attack scenario can be mitigated. An attacker who successfully exploited CVE-2022-34838 may add or alter data points and corresponding attributes. Once such engineering data is used the data visualization will be altered for the end user.

  • CVSS V3 rated as Critical - 8.4 severity.
  • CVSS V2 rated as Low - 1.7 severity.
  • Solution

    Customers are advised to refer to CERT MITIGATIONS section ABBVREP0079 for affected packages and patching details.

    CVEs related to QID 591038

    Software Advisories
    Advisory ID Software Component Link
    ABBVREP0079 URL Logo search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch