CVE-2024-10334

7.3 HIGH

📋 TL;DR

A vulnerability in ABB's VideONet component within System 800xA versions allows attackers to disrupt or manipulate video feeds. This affects industrial control systems using the listed 800xA versions where VideONet is deployed, potentially impacting operational visibility.

💻 Affected Systems

Products:
  • ABB System 800xA with VideONet component
Versions: System 800xA: 5.1.X, 6.0.3.X, 6.1.1.X, 6.2.X
Operating Systems: Not specified in CVE, typically Windows-based for 800xA systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where VideONet component is installed and active

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of video surveillance capability or manipulated video feed leading to operational blind spots or false situational awareness

🟠

Likely Case

Video feed disruption causing temporary loss of monitoring capability in industrial environments

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation

🌐 Internet-Facing: MEDIUM - Requires network access to vulnerable component, but industrial systems often have limited internet exposure
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to disrupt critical monitoring

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

CWE-256 suggests plaintext credential storage issue, likely requiring some level of access or credential compromise

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to ABB advisory 7PAA012159 for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=7PAA012159&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: No

Instructions:

1. Download patch from ABB support portal. 2. Apply patch following ABB's installation instructions. 3. Verify VideONet functionality post-patch.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VideONet components from untrusted networks and limit access to authorized systems only

Access Control Hardening

all

Implement strict authentication and authorization controls for VideONet access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate VideONet from other systems
  • Monitor network traffic to/from VideONet components for anomalous activity

🔍 How to Verify

Check if Vulnerable:

Check System 800xA version and verify VideONet component is installed

Check Version:

Use ABB System 800xA management console or check system properties

Verify Fix Applied:

Confirm patch installation via ABB system management tools and verify VideONet version against patched versions in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to VideONet
  • Video feed disruption events in system logs

Network Indicators:

  • Unexpected network connections to VideONet ports
  • Anomalous traffic patterns to video streaming endpoints

SIEM Query:

source="800xA" AND (event="Video_Feed_Disruption" OR auth_failure="VideONet")

🔗 References

📤 Share & Export