CVE-2024-12430

7.0 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary commands as root on ABB AC500 V3 PLCs after exploiting CVE-2024-12429 (directory traversal). Attackers can inject commands into crafted files that get executed with root privileges. All AC500 V3 products (PM5xxx series) with firmware earlier than 3.8.0 are affected.

💻 Affected Systems

Products:
  • ABB AC500 V3 PLCs (PM5xxx series)
Versions: All firmware versions earlier than 3.8.0
Operating Systems: ABB AC500 V3 firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires successful exploitation of CVE-2024-12429 (directory traversal) first, then authenticated access to exploit command injection.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with root-level command execution allowing complete control of industrial PLC, potential disruption of industrial processes, data theft, or ransomware deployment.

🟠

Likely Case

Authenticated attackers gaining root access to manipulate PLC logic, modify configurations, disrupt operations, or establish persistence in industrial networks.

🟢

If Mitigated

Limited impact with proper network segmentation, authentication controls, and monitoring detecting anomalous file access patterns.

🌐 Internet-Facing: HIGH if devices are exposed to internet without proper segmentation and authentication controls.
🏢 Internal Only: MEDIUM as exploitation requires authentication and CVE-2024-12429 prerequisite, but successful attacks could compromise critical industrial systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Two-step exploitation required: first directory traversal (CVE-2024-12429), then authenticated command injection. Requires knowledge of specific file crafting techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 3.8.0 or later

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=3ADR011377&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Download firmware 3.8.0+ from ABB portal. 2. Backup current configuration. 3. Upload new firmware via engineering tool. 4. Restart PLC. 5. Restore configuration. 6. Verify firmware version.

🔧 Temporary Workarounds

Network segmentation and access control

all

Isolate AC500 PLCs in dedicated network segments with strict firewall rules limiting access to authorized engineering stations only.

Strong authentication enforcement

all

Implement multi-factor authentication and strong password policies for all accounts with access to PLC engineering tools.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AC500 devices from untrusted networks
  • Enforce least privilege access controls and monitor for anomalous file access patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via engineering tool or web interface. If version is earlier than 3.8.0, system is vulnerable.

Check Version:

Use ABB Automation Builder or CoDeSys engineering tool to read PLC firmware version

Verify Fix Applied:

Confirm firmware version is 3.8.0 or later via engineering tool display or version query command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in PLC logs
  • Multiple failed authentication attempts followed by successful login
  • Unexpected file creation/modification in system directories

Network Indicators:

  • Unusual traffic patterns to PLC engineering ports
  • Multiple directory traversal attempts followed by file uploads

SIEM Query:

source="plc_logs" AND (event="file_access" AND path="*system*") OR (event="auth" AND result="success" AFTER result="failure")

🔗 References

📤 Share & Export