CVE-2024-48845

9.4 CRITICAL

📋 TL;DR

This CVE describes weak password reset rules in ABB building automation systems that allow storage of weak passwords, potentially enabling unauthorized administrative or application access. Affected systems include ABB ASPECT-Enterprise, NEXUS Series, and MATRIX Series version 3.07.02.

💻 Affected Systems

Products:
  • ABB ASPECT-Enterprise
  • ABB NEXUS Series
  • ABB MATRIX Series
Versions: v3.07.02
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems running the specified version regardless of configuration. These are building automation and control systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to building automation systems, potentially compromising physical security controls, environmental systems, and operational technology networks.

🟠

Likely Case

Unauthorized users gain application-level access to manipulate building systems, view sensitive operational data, or disrupt normal operations.

🟢

If Mitigated

With strong password policies and network segmentation, impact is limited to potential information disclosure without system compromise.

🌐 Internet-Facing: HIGH if systems are exposed to internet, as weak passwords can be brute-forced or guessed remotely.
🏢 Internal Only: MEDIUM as internal attackers could exploit weak passwords, but requires network access to affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to password reset functionality and knowledge of weak password rules. No authentication bypass is indicated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided reference

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Review ABB advisory for specific patch details. 2. Apply recommended updates from ABB. 3. Restart affected systems. 4. Verify password policies are enforced.

🔧 Temporary Workarounds

Enforce Strong Password Policy

all

Implement and enforce strong password requirements including minimum length, complexity, and expiration policies.

Network Segmentation

all

Isolate building automation systems from general corporate networks and internet access.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach affected systems
  • Enable detailed logging and monitoring of authentication attempts and password changes

🔍 How to Verify

Check if Vulnerable:

Check system version against affected version 3.07.02 and review password policy settings.

Check Version:

Check system documentation or web interface for version information (ABB systems vary)

Verify Fix Applied:

Verify system is updated beyond version 3.07.02 and test password reset functionality with weak passwords.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Password reset requests
  • Unusual administrative access patterns

Network Indicators:

  • Unexpected connections to building automation system ports
  • Brute-force attack patterns

SIEM Query:

source="abb_system" AND (event_type="authentication_failure" OR event_type="password_reset")

🔗 References

📤 Share & Export