CVE-2024-51545

10.0 CRITICAL

📋 TL;DR

This CVE describes a username enumeration vulnerability in ABB industrial control system products that allows attackers to access user management functions. Attackers can add, delete, modify, and list usernames without proper authentication. Organizations using affected ABB ASPECT, NEXUS, and MATRIX series products are at risk.

💻 Affected Systems

Products:
  • ABB ASPECT - Enterprise
  • ABB NEXUS Series
  • ABB MATRIX Series
Versions: v3.08.02
Operating Systems: Industrial control system platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific industrial control system products used in critical infrastructure environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems allowing attackers to create administrative accounts, delete legitimate users, and gain full control over critical infrastructure operations.

🟠

Likely Case

Unauthorized access to user management functions leading to privilege escalation, account manipulation, and potential disruption of industrial processes.

🟢

If Mitigated

Limited impact with proper network segmentation, authentication controls, and monitoring in place to detect enumeration attempts.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can remotely enumerate and manipulate user accounts without authentication.
🏢 Internal Only: HIGH - Even internally, this allows lateral movement and privilege escalation within industrial networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Username enumeration vulnerabilities typically require minimal technical skill to exploit once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for updated versions

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Review vendor advisory 2. Apply recommended patches 3. Restart affected systems 4. Verify patch installation

🔧 Temporary Workarounds

Network segmentation

all

Isolate affected systems from untrusted networks

Access control restrictions

all

Implement strict firewall rules to limit access to user management interfaces

🧯 If You Can't Patch

  • Implement network segmentation to isolate affected systems
  • Deploy intrusion detection systems to monitor for enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Test if user management functions are accessible without proper authentication

Check Version:

Check system version through product interface or vendor documentation

Verify Fix Applied:

Verify patches are applied and test that user management functions require proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts
  • Unauthorized access to user management endpoints
  • Unusual account creation/modification events

Network Indicators:

  • Traffic to user management interfaces from unauthorized sources
  • Patterns of enumeration requests

SIEM Query:

source_ip OUTSIDE trusted_networks AND destination_port IN [management_ports] AND http_method IN ["POST","GET"] AND uri CONTAINS "user"

🔗 References

📤 Share & Export