CVE-2020-24679

7.5 HIGH

📋 TL;DR

CVE-2020-24679 is a vulnerability in ABB's S+ Operations and S+ Historian services where specially crafted messages can cause denial of service or potentially arbitrary code execution. This affects industrial control systems using these ABB products, potentially allowing attackers to disrupt operations or gain control of affected systems.

💻 Affected Systems

Products:
  • ABB S+ Operations
  • ABB S+ Historian
Versions: Specific versions not detailed in references, but all unpatched versions are likely affected
Operating Systems: Windows (typical for industrial control systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the service components of these industrial control system products. Exact version ranges should be verified with vendor documentation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, operational disruption, and potential safety impacts in industrial environments.

🟠

Likely Case

Service crashes causing denial of service and operational downtime in affected industrial systems.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, potentially only causing temporary service interruptions.

🌐 Internet-Facing: HIGH - If exposed to untrusted networks, attackers can send crafted messages without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to the service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific messages to the service, but no authentication is needed if network access is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patches available via vendor advisories

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2PAA123980&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download patches from ABB advisory links. 2. Apply patches following vendor instructions. 3. Restart affected services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to S+ Operations and Historian services to only trusted systems

Firewall Rules

all

Implement strict firewall rules to limit which systems can communicate with vulnerable services

🧯 If You Can't Patch

  • Implement strict network segmentation and access controls
  • Deploy intrusion detection systems to monitor for crafted message patterns

🔍 How to Verify

Check if Vulnerable:

Check if running affected ABB S+ Operations or Historian versions without patches applied

Check Version:

Check product version through ABB management interfaces or Windows Services

Verify Fix Applied:

Verify patch installation via vendor documentation and check service version after patching

📡 Detection & Monitoring

Log Indicators:

  • Service crash logs
  • Unusual connection attempts to S+ services
  • Error messages related to malformed messages

Network Indicators:

  • Unusual traffic patterns to S+ service ports
  • Crafted message patterns in network traffic

SIEM Query:

source="*S+*" AND (event_type="crash" OR message="*malformed*" OR message="*crafted*")

🔗 References

📤 Share & Export