CVE-2020-24673

9.8 CRITICAL

📋 TL;DR

This critical SQL injection vulnerability in ABB's S+ Operations and S+ Historian software allows attackers to execute arbitrary SQL commands on the database. Successful exploitation can lead to data theft, data manipulation, database administration operations, file system access, and potentially operating system command execution. Organizations using affected versions of these industrial control system products are at risk.

💻 Affected Systems

Products:
  • S+ Operations
  • S+ Historian
Versions: Specific affected versions not specified in references, but all unpatched versions are vulnerable
Operating Systems: Windows-based systems running ABB S+ software
Default Config Vulnerable: ⚠️ Yes
Notes: Industrial control systems used in critical infrastructure environments

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database and underlying operating system, allowing data exfiltration, system manipulation, and potential disruption of industrial operations.

🟠

Likely Case

Unauthorized data access and manipulation, potentially leading to operational data corruption or theft of sensitive industrial information.

🟢

If Mitigated

Limited impact with proper network segmentation, database permissions, and input validation controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are typically easy to exploit with automated tools

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available via ABB security advisories

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2PAA123980&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download patches from ABB security advisories 2. Apply patches following ABB documentation 3. Restart affected services 4. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate S+ systems from untrusted networks and implement strict firewall rules

Database Permission Reduction

all

Limit database user permissions to minimum required functionality

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries in custom applications
  • Deploy web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running unpatched versions of S+ Operations or S+ Historian

Check Version:

Check version through S+ software interface or installation directory

Verify Fix Applied:

Verify patch installation and check version against ABB's patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns
  • Database error logs showing SQL syntax errors
  • Unexpected database administration commands

Network Indicators:

  • SQL injection patterns in network traffic to S+ services
  • Unusual database connection attempts

SIEM Query:

source="S+_logs" AND ("sql" OR "database") AND ("error" OR "unexpected" OR "syntax")

🔗 References

📤 Share & Export