CVE-2024-6784

9.9 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in ABB industrial control system products that allows attackers to make the server send unauthorized requests to internal or external systems. This can lead to information disclosure, internal network reconnaissance, or access to restricted resources. Affected systems include ABB ASPECT-Enterprise, NEXUS Series, and MATRIX Series version 3.08.02.

💻 Affected Systems

Products:
  • ABB ASPECT-Enterprise
  • ABB NEXUS Series
  • ABB MATRIX Series
Versions: v3.08.02
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 3.08.02 are affected. These are industrial control systems used in critical infrastructure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal systems, retrieve sensitive data, pivot to other critical infrastructure, or perform denial-of-service attacks against internal services.

🟠

Likely Case

Information disclosure of internal network resources, metadata about internal systems, or limited access to adjacent services.

🟢

If Mitigated

Limited impact if network segmentation prevents access to sensitive systems and input validation blocks malicious requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SSRF vulnerabilities typically have low exploitation complexity once the vulnerable endpoint is identified. Authentication requirements are not specified in the advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact ABB for updated version

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A7497&LanguageCode=en&DocumentPartId=&Action=Launch

Restart Required: Yes

Instructions:

1. Contact ABB support for patched version. 2. Backup system configuration. 3. Apply update following ABB's instructions. 4. Restart affected systems. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from affected systems to only necessary destinations

Input Validation

all

Implement strict validation of user-supplied URLs and restrict allowed protocols/schemes

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems
  • Deploy web application firewall with SSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check system version in ABB management interface. If version is 3.08.02, system is vulnerable.

Check Version:

Check via ABB management interface or contact ABB support

Verify Fix Applied:

Verify updated version number in management interface and test SSRF functionality is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from server
  • Requests to internal IP addresses or unusual domains
  • Failed authentication attempts followed by SSRF patterns

Network Indicators:

  • Outbound requests from industrial systems to unexpected destinations
  • HTTP requests with unusual parameters or headers

SIEM Query:

source="ABB_System" AND (url="*://192.168.*" OR url="*://10.*" OR url="*://127.*" OR url="*://169.254.*")

🔗 References

📤 Share & Export