CVE-2024-48849

9.4 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass WebSocket origin validation in FLXEON systems, enabling unauthorized HTTPS requests. Attackers can potentially hijack sessions or perform actions as authenticated users. All FLXEON installations through version 9.3.4 are affected.

💻 Affected Systems

Products:
  • FLXEON
Versions: through <= 9.3.4
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All FLXEON deployments using WebSocket functionality are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through session hijacking, data exfiltration, and unauthorized administrative actions.

🟠

Likely Case

Session hijacking leading to unauthorized access to sensitive data and system functions.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

WebSocket origin validation bypass typically requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version > 9.3.4

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A5684&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: Yes

Instructions:

1. Download patch from ABB advisory. 2. Backup current installation. 3. Apply patch following vendor instructions. 4. Restart FLXEON services. 5. Verify fix implementation.

🔧 Temporary Workarounds

WebSocket Origin Restriction

all

Implement strict origin validation at network perimeter or reverse proxy level

# Example nginx config: add_header Access-Control-Allow-Origin 'trusted-domain.com';

Session Validation Enhancement

all

Add additional session validation checks in application layer

# Implement CSRF tokens and session binding to IP/user-agent

🧯 If You Can't Patch

  • Isolate FLXEON systems behind strict network segmentation with limited external access
  • Implement Web Application Firewall (WAF) rules to block unauthorized WebSocket connections

🔍 How to Verify

Check if Vulnerable:

Check FLXEON version via admin interface or system logs. Versions <= 9.3.4 are vulnerable.

Check Version:

Check FLXEON web interface or system configuration for version information

Verify Fix Applied:

Verify version is > 9.3.4 and test WebSocket connections with unauthorized origins are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized WebSocket connection attempts
  • Session ID reuse from different origins
  • Failed origin validation logs

Network Indicators:

  • WebSocket traffic from unexpected origins
  • HTTPS requests with mismatched session tokens

SIEM Query:

websocket AND (origin NOT IN allowed_origins) OR (session_id FROM multiple_origins)

🔗 References

📤 Share & Export