CVE-2020-24683

9.8 CRITICAL

📋 TL;DR

CVE-2020-24683 is an authentication bypass vulnerability in S+ Operations software where client-side authentication can be circumvented, allowing unauthorized connections to the server. This affects S+ Operations version 2.1 SP1 and earlier. Attackers can potentially gain unauthorized access to industrial control systems.

💻 Affected Systems

Products:
  • ABB S+ Operations
Versions: Version 2.1 SP1 and earlier
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using client-side authentication in S+ Operations software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems, allowing attackers to manipulate processes, disrupt operations, or cause physical damage.

🟠

Likely Case

Unauthorized access to control systems enabling data theft, monitoring of operations, or preparation for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can directly exploit without network access.
🏢 Internal Only: HIGH - Even internally, attackers with network access can bypass authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass requires network access but no credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.1 SP2 or later

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2PAA123980&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download patch from ABB advisory. 2. Apply to all affected S+ Operations installations. 3. Restart systems. 4. Verify authentication now requires server validation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate S+ Operations systems from untrusted networks

Firewall Rules

all

Restrict access to S+ Operations ports to authorized IPs only

🧯 If You Can't Patch

  • Implement strict network segmentation and access controls
  • Monitor for unauthorized connection attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check S+ Operations version in software interface or installation directory

Check Version:

Check via S+ Operations interface or installation properties

Verify Fix Applied:

Verify version is 2.1 SP2 or later and test authentication requires server validation

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts
  • Failed authentication events
  • Unexpected client connections

Network Indicators:

  • Traffic to S+ Operations ports from unauthorized sources
  • Authentication bypass attempts

SIEM Query:

source_ip NOT IN authorized_list AND destination_port IN [s+_operations_ports]

🔗 References

📤 Share & Export