CVE-2024-51552

6.0 MEDIUM

📋 TL;DR

This CVE describes weak password storage vulnerabilities in ABB's ASPECT, NEXUS, and MATRIX series products. If administrator credentials are compromised, attackers could potentially access stored passwords in a recoverable format. This affects all versions through 3.* of the listed product lines.

💻 Affected Systems

Products:
  • ASPECT-Enterprise
  • NEXUS Series
  • MATRIX Series
Versions: through 3.*
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations of affected versions are vulnerable. The vulnerability exists in how passwords are stored when administrator credentials are compromised.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of affected systems if administrator credentials are obtained, allowing attackers to recover stored passwords and gain unauthorized access to critical infrastructure.

🟠

Likely Case

Privilege escalation or lateral movement within the system if an attacker obtains administrator credentials through other means.

🟢

If Mitigated

Limited impact if strong access controls, network segmentation, and credential monitoring are in place to prevent credential theft.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires obtaining administrator credentials first through other means (phishing, credential theft, etc.).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.* (consult vendor advisory)

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A0021&LanguageCode=en&DocumentPartId=pdf&Action=Launch

Restart Required: Yes

Instructions:

1. Review the vendor advisory. 2. Upgrade affected systems to versions beyond 3.*. 3. Restart services after patching. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Strengthen Access Controls

all

Implement strict access controls and monitoring for administrator accounts to prevent credential compromise.

Network Segmentation

all

Isolate affected systems from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement multi-factor authentication for all administrator accounts
  • Monitor and audit administrator account activity for suspicious behavior

🔍 How to Verify

Check if Vulnerable:

Check product version against affected versions (through 3.*). Review system configuration for weak password storage mechanisms.

Check Version:

Consult product documentation for version check command specific to each product line.

Verify Fix Applied:

Verify system is running version beyond 3.* and check vendor documentation for specific fix verification steps.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator login attempts
  • Multiple failed authentication attempts
  • Changes to password storage or authentication configurations

Network Indicators:

  • Unexpected authentication traffic to affected systems
  • Traffic patterns suggesting credential harvesting

SIEM Query:

Authentication logs from affected systems showing administrator account access from unusual locations or times

🔗 References

📤 Share & Export