CVE-2024-13951

7.6 HIGH

📋 TL;DR

This vulnerability in ABB's ASPECT, NEXUS, and MATRIX series involves using predictable salts in one-way hash functions, potentially allowing attackers to crack hashed sensitive information like passwords. It affects all versions through 3.* of these industrial control system products. Attackers could gain unauthorized access to protected data.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXUS Series
  • MATRIX Series
Versions: through 3.*
Operating Systems: Windows-based industrial control systems
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers crack hashed credentials and gain administrative access to industrial control systems, enabling manipulation of critical infrastructure operations.

🟠

Likely Case

Attackers extract and crack hashed user credentials, gaining unauthorized access to system interfaces and potentially sensitive operational data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to credential exposure without system compromise.

🌐 Internet-Facing: HIGH if systems are internet-accessible, as attackers can remotely attempt hash cracking without network access.
🏢 Internal Only: MEDIUM as attackers still need internal network access, but predictable salts make hash cracking feasible once hashes are obtained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining hashed credentials first, but hash cracking with predictable salts is straightforward using standard tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.* (consult vendor advisory for specific fixed versions)

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific fixed versions. 2. Schedule maintenance window. 3. Backup system configuration. 4. Apply vendor-provided patches. 5. Restart affected systems. 6. Verify functionality.

🔧 Temporary Workarounds

Network segmentation and access controls

all

Restrict network access to affected systems to prevent attackers from obtaining hashed credentials.

Credential rotation

all

Change all user passwords after patching to ensure any previously exposed hashes are invalidated.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from untrusted networks
  • Enforce multi-factor authentication and regular credential rotation to limit impact of credential exposure

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions (through 3.*) in vendor documentation.

Check Version:

Check via system administration interface or consult vendor documentation for version checking procedure.

Verify Fix Applied:

Verify installed version is above 3.* or specifically listed as patched in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Multiple failed login attempts followed by successful login from new location

Network Indicators:

  • Unexpected network traffic to/from affected systems
  • Credential dumping tools communicating with systems

SIEM Query:

source="affected_system" AND (event_type="authentication" AND result="success" AND user_changed="true") OR (process_name="hashcat" OR process_name="john" AND destination_ip="affected_system_ip")

🔗 References

📤 Share & Export