CVE-2024-13948

7.3 HIGH

📋 TL;DR

This vulnerability involves insecure Windows permissions for ASPECT configuration toolsets, allowing unauthorized access to configuration information. It affects multiple ABB industrial control system products including ASPECT-Enterprise, NEXUS Series, and MATRIX Series through version 3.*.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXXUS Series
  • MATRIX Series
Versions: through 3.*
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows-based industrial control system configuration toolsets from ABB

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration data, potentially enabling further attacks on industrial control systems, including manipulation of operational parameters or gaining deeper network access.

🟠

Likely Case

Unauthorized users accessing configuration files containing system settings, network information, or operational parameters that could be used for reconnaissance or targeted attacks.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to information disclosure without direct system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Windows system where toolsets are installed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to ABB advisory for specific patched versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Review ABB security advisory 9AKK108471A0021
2. Apply recommended patches from ABB
3. Restart affected systems
4. Verify permissions are properly secured

🔧 Temporary Workarounds

Restrict Windows File Permissions

windows

Manually secure configuration toolset directories with proper Windows ACLs

icacls "C:\Program Files\ABB\ASPECT" /inheritance:r /grant:r "Administrators:(OI)(CI)F" /grant:r "SYSTEM:(OI)(CI)F" /grant:r "Authenticated Users:(OI)(CI)RX"

Network Segmentation

all

Isolate industrial control systems from general corporate networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Apply principle of least privilege to Windows user accounts accessing these systems

🔍 How to Verify

Check if Vulnerable:

Check if ASPECT, NEXUS, or MATRIX configuration toolsets version 3.* or earlier are installed on Windows systems

Check Version:

Check ABB software version in Control Panel > Programs and Features or via vendor documentation

Verify Fix Applied:

Verify Windows permissions on configuration directories restrict access to authorized users only

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to configuration directories
  • Changes to file permissions on ABB toolset directories

Network Indicators:

  • Unusual access patterns to industrial control system management interfaces

SIEM Query:

EventID=4663 AND ObjectName LIKE '%ABB%' AND AccessesMask NOT IN ('ReadData', 'ReadAttributes')

🔗 References

📤 Share & Export