CVE-2024-9876

7.3 HIGH

📋 TL;DR

A Modification of Assumed-Immutable Data (MAID) vulnerability in ABB ANC, ANC-L, and ANC-mini devices allows attackers to modify data that should be protected. This affects all versions through 1.1.4 of these industrial automation controllers. Attackers could potentially manipulate configuration or operational data.

💻 Affected Systems

Products:
  • ABB ANC
  • ABB ANC-L
  • ABB ANC-mini
Versions: through 1.1.4
Operating Systems: Embedded/Industrial OS
Default Config Vulnerable: ⚠️ Yes
Notes: All configurations running affected versions are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems leading to operational disruption, safety hazards, or data manipulation affecting physical processes.

🟠

Likely Case

Unauthorized modification of configuration settings leading to operational issues or data integrity problems.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the device and knowledge of the data structures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.1.4

Vendor Advisory: https://search.abb.com/library/Download.aspx?DocumentID=2CRT000006&LanguageCode=en&DocumentPartId=PDF&Action=Launch

Restart Required: Yes

Instructions:

1. Download updated firmware from ABB support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit access to authorized personnel only.

Access Control Lists

all

Implement strict network access controls to limit communication with affected devices.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to isolate devices
  • Monitor network traffic to/from affected devices for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI. If version is 1.1.4 or earlier, device is vulnerable.

Check Version:

Check via device web interface or consult device documentation for version query command.

Verify Fix Applied:

Verify firmware version is greater than 1.1.4 after applying update.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized configuration changes
  • Unexpected firmware modification attempts
  • Access from unauthorized IP addresses

Network Indicators:

  • Unusual data modification traffic to device ports
  • Traffic patterns inconsistent with normal operations

SIEM Query:

source_ip NOT IN (authorized_ips) AND dest_ip IN (device_ips) AND (port=80 OR port=443 OR port=502)

🔗 References

📤 Share & Export