CVE-2024-51547
📋 TL;DR
This CVE describes a use of hard-coded credentials vulnerability in multiple ABB industrial control system products. Attackers can use these embedded credentials to gain unauthorized access to affected systems. This affects ABB ASPECT-Enterprise, NEXUS Series, and MATRIX Series products through version 3.*.
💻 Affected Systems
- ABB ASPECT-Enterprise
- ABB NEXUS Series
- ABB MATRIX Series
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial control systems allowing attackers to manipulate processes, disrupt operations, steal sensitive data, or cause physical damage to equipment.
Likely Case
Unauthorized access to control systems enabling data theft, configuration changes, and potential disruption of industrial processes.
If Mitigated
Limited impact if systems are properly segmented, monitored, and access controlled, though credentials remain vulnerable if exposed.
🎯 Exploit Status
Exploitation requires knowledge of the hard-coded credentials but no authentication is needed once credentials are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.* (consult ABB advisory for specific fixed versions)
Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A6775&LanguageCode=en&DocumentPartId=pdf%20-%20Public%20Advisory&Action=Launch
Restart Required: Yes
Instructions:
1. Review ABB advisory for specific patch details. 2. Apply vendor-provided patches or upgrades to versions beyond 3.*. 3. Restart affected systems. 4. Verify credentials have been changed or removed.
🔧 Temporary Workarounds
Network segmentation and access control
allIsolate affected systems from untrusted networks and implement strict access controls.
Credential rotation if possible
allChange any hard-coded credentials if the system allows credential modification.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate affected systems from untrusted networks
- Deploy intrusion detection systems and monitor for unauthorized access attempts using known hard-coded credentials
🔍 How to Verify
Check if Vulnerable:
Check system version against affected versions (through 3.*) and review ABB advisory for specific vulnerable configurations.
Check Version:
System-specific command - consult ABB documentation for version checking on each product line.
Verify Fix Applied:
Verify system has been upgraded to version beyond 3.* and test that hard-coded credentials no longer provide access.
📡 Detection & Monitoring
Log Indicators:
- Authentication attempts using hard-coded credentials
- Unauthorized access from unexpected sources
- Configuration changes by unauthorized users
Network Indicators:
- Traffic to/from affected systems using default credentials
- Unexpected protocol communications to industrial control ports
SIEM Query:
Example: (event_type="authentication" AND (username="[hard-coded-username]" OR credential_hash="[hard-coded-hash]")) OR (destination_ip IN [affected_systems] AND protocol IN [industrial_protocols] AND source_ip NOT IN [authorized_ips])