CVE-2024-13950

6.8 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in ABB's ASPECT, NEXUS, and MATRIX series products. Attackers with compromised administrator credentials can inject malicious scripts into logs, potentially executing arbitrary code in victims' browsers. This affects all versions up to 3.* of the listed product families.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXUS Series
  • MATRIX Series
Versions: through 3.*
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires compromised administrator credentials for exploitation according to the description.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through privilege escalation, data theft, or ransomware deployment if malicious scripts execute with administrative privileges.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized actions performed through injected scripts in administrator interfaces.

🟢

If Mitigated

Limited impact if proper access controls, input validation, and output encoding are implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires both the vulnerability and compromised administrator credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions beyond 3.* (check vendor advisory for specific fixed versions)

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Review ABB advisory 9AKK108471A0021. 2. Download and apply the latest firmware/software update from ABB. 3. Restart affected systems. 4. Verify the update was successful.

🔧 Temporary Workarounds

Implement Input Validation and Output Encoding

all

Add server-side validation and proper output encoding for log entries to prevent script injection.

Configuration-specific - implement in application code

Restrict Administrative Access

all

Limit administrative access to trusted networks and implement multi-factor authentication.

Network firewall rules and MFA configuration

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources.
  • Monitor and audit administrator account activity for suspicious behavior.

🔍 How to Verify

Check if Vulnerable:

Check product version against affected versions (through 3.*) in system administration interface.

Check Version:

Product-specific - check via system administration interface or vendor documentation.

Verify Fix Applied:

Verify installed version is beyond 3.* and test log functionality with script-like input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual log entries containing script tags or JavaScript code
  • Multiple failed administrator login attempts followed by successful login

Network Indicators:

  • Unexpected outbound connections from administrative interfaces
  • Traffic patterns suggesting credential stuffing attacks

SIEM Query:

source="aspect_logs" OR source="nexus_logs" OR source="matrix_logs" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export