CVE-2024-13946

6.8 MEDIUM

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code by planting malicious DLL files that the ASPECT configuration toolset loads without proper signature verification. It affects all versions of ASPECT-Enterprise, NEXUS Series, and MATRIX Series up to version 3.*.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXUS Series
  • MATRIX Series
Versions: through 3.*
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the configuration toolset during device commissioning operations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining control over the industrial control system, potentially disrupting operations or causing physical damage.

🟠

Likely Case

Local privilege escalation or execution of malicious code on systems where attackers have file write access to DLL search paths.

🟢

If Mitigated

Limited impact if proper file permissions and application whitelisting prevent unauthorized DLL placement.

🌐 Internet-Facing: LOW - Requires local access or ability to plant files on target system.
🏢 Internal Only: MEDIUM - Internal attackers or malware with file write capabilities could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires ability to place malicious DLL in application search path, but DLL hijacking is well-understood attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.*

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Download updated version from ABB. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart affected systems. 5. Verify DLL signature validation is working.

🔧 Temporary Workarounds

Restrict DLL Search Path Permissions

windows

Set strict file permissions on directories where ASPECT tools search for DLLs to prevent unauthorized file placement.

icacls "C:\Program Files\ABB\ASPECT\" /deny Everyone:(OI)(CI)(W)
icacls "C:\Windows\System32\" /deny Everyone:(OI)(CI)(W)

Enable Application Whitelisting

windows

Use Windows AppLocker or similar to only allow execution of signed binaries from trusted locations.

New-AppLockerPolicy -RuleType Publisher,Path -User Everyone -Action Deny

🧯 If You Can't Patch

  • Implement strict file system permissions to prevent unauthorized DLL placement in application directories.
  • Use application control solutions to block execution of unsigned DLLs in the ASPECT toolset environment.

🔍 How to Verify

Check if Vulnerable:

Check if ASPECT configuration toolset loads DLLs without signature verification by monitoring Process Monitor for unsigned DLL loads.

Check Version:

Check application version in Control Panel > Programs and Features or run: wmic product where "name like '%ASPECT%'" get version

Verify Fix Applied:

Verify that updated versions validate DLL signatures by attempting to load an unsigned test DLL and confirming it's rejected.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unsigned DLL loads (Event ID 11)
  • Application errors when loading DLLs
  • Unexpected process spawning from ASPECT tools

Network Indicators:

  • Unusual outbound connections from ASPECT processes
  • File transfer activity to/from ASPECT directories

SIEM Query:

source="windows" AND (event_id=11 OR process_name="*aspect*") AND message="*unsigned*" OR "*dll*"

🔗 References

📤 Share & Export