CVE-2020-24675

9.8 CRITICAL

📋 TL;DR

CVE-2020-24675 is an authentication bypass vulnerability in ABB's S+ Operations and S+ History software that allows unauthenticated attackers to inject values and write to controlled industrial processes. This affects systems running vulnerable versions of these ABB industrial control system products. The CVSS 9.8 score indicates critical severity due to the potential for remote code execution and process manipulation.

💻 Affected Systems

Products:
  • ABB S+ Operations
  • ABB S+ History
Versions: Specific versions not detailed in references, but all vulnerable versions before patching
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Operations History server and standalone S+ History server configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to physical damage, production shutdown, safety system manipulation, or environmental harm through unauthorized process control.

🟠

Likely Case

Unauthorized data injection into industrial processes causing operational disruption, data integrity issues, or limited process manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation possible if systems are exposed to internet.
🏢 Internal Only: HIGH - Even internally, unauthenticated access allows attackers with network access to compromise systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-287 indicates improper authentication, making exploitation straightforward once vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available via ABB security advisories

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2PAA123980&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download patches from ABB security advisories 2. Apply patches to affected S+ Operations and S+ History servers 3. Restart affected services/systems 4. Verify patch application

🔧 Temporary Workarounds

Network Segmentation

all

Isolate S+ Operations and S+ History servers from untrusted networks

Access Control Lists

all

Implement strict firewall rules to limit access to vulnerable servers

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable systems
  • Deploy intrusion detection systems monitoring for unusual process control commands

🔍 How to Verify

Check if Vulnerable:

Check system version against ABB security advisories and verify if patches have been applied

Check Version:

Check within S+ Operations/S+ History application interface or consult ABB documentation

Verify Fix Applied:

Verify patch installation via system logs and version checks, then test authentication requirements

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to Operations History server
  • Unexpected process control commands
  • Authentication bypass attempts

Network Indicators:

  • Unusual traffic to S+ Operations/History ports from unauthorized sources
  • Process control commands from unexpected IPs

SIEM Query:

source_ip NOT IN (authorized_ips) AND dest_port IN (splus_ports) AND protocol=tcp

🔗 References

📤 Share & Export