CVE-2024-0335

7.5 HIGH

📋 TL;DR

This vulnerability in ABB's S+ Control API component allows attackers to exploit path traversal (CWE-23) through the VPNI feature. It affects multiple Symphony Plus products including S+ Operations, S+ Engineering, and S+ Analyst. Attackers could potentially access or manipulate files outside intended directories.

💻 Affected Systems

Products:
  • Symphony Plus S+ Operations
  • Symphony Plus S+ Engineering
  • Symphony Plus S+ Analyst
Versions: S+ Operations: 3.0.0-3.3 SP1 RU4, 2.1.0-2.1 SP2 RU3, 2.0.0-2.0 SP6 TC6; S+ Engineering: 2.1-2.3 RU3; S+ Analyst: 7.0.0.0-7.2.0.2
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects VPNI feature of S+ Control API component across multiple Symphony Plus products.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized file system access leading to sensitive data exposure, configuration manipulation, or system compromise.

🟠

Likely Case

Limited file access or information disclosure from vulnerable systems.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls.

🌐 Internet-Facing: MEDIUM - If exposed to internet, could be targeted by automated scanners.
🏢 Internal Only: HIGH - Industrial control systems often have critical data accessible internally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Path traversal vulnerabilities typically require some knowledge of target system structure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to ABB security advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=7PAA002536&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Review ABB security advisory 7PAA002536. 2. Apply recommended patches/updates. 3. Restart affected services/systems. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from untrusted networks

Access Control Restrictions

all

Limit network access to S+ Control API to authorized systems only

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules
  • Monitor for unusual file access patterns and audit logs regularly

🔍 How to Verify

Check if Vulnerable:

Check product version against affected ranges in ABB advisory

Check Version:

Product-specific - consult ABB documentation for version checking

Verify Fix Applied:

Verify installed version is outside affected ranges or patched per ABB guidance

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Path traversal attempts in API logs
  • Unauthorized access attempts

Network Indicators:

  • Traffic to S+ Control API with suspicious path patterns
  • Unusual outbound connections

SIEM Query:

Search for patterns like '../' or directory traversal attempts in web/API logs

🔗 References

📤 Share & Export