Description
ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.
Problem types
CWE-347 Improper Verification of Cryptographic Signature
Product status
1.0.0 (custom)
2.0.0 (custom)
1.0.0 (custom)
1.0.0 (custom)
PCL1 (custom)
1.1.1 (custom)
1.2.0 (custom)
1.0.0 (custom)
1.1.0 (custom)
1.2.0 (custom)
1.3.0 (custom)
1.0.0 (custom)
1.0 (custom)
1.0 FP1 (custom)
1.0 FP2 (custom)
1.0 FP3 (custom)
1.0 FP4 (custom)
4.0.0 (custom)
1.0.0 (custom)
2.0.0 (custom)
3.0.0 (custom)
4.0.0 (custom)
4.1.9 (custom)
5.0.0 (custom)
5.1.0 (custom)
2.0.0 (custom)
3.0.0 (custom)
3.1.0 (custom)
4.1.0 (custom)
5.1.0 (custom)
2.0.0 (custom)
4.0.0 (custom)
4.1.0 (custom)
4.2.0 (custom)
5.1.0 (custom)
1.0.0 (custom)
2.0.0 (custom)
1.0.0 (custom)
2.0.0 (custom)
1.0.0 (custom)
1.0.0 (custom)
2.0.0 (custom)
2.1.0 (custom)
1.1.0 (custom)
1.2.0 (custom)
1.3.0 (custom)
1.0.0 (custom)
3.3 (custom)
3.4 (custom)
3.5 (custom)
4.0 (custom)
4.1 (custom)
5.0 (custom)
5.1 (custom)
Exx (custom)
Mxx (custom)
Sxx (custom)
xMx (custom)
Exxx (custom)
Mxxx (custom)
Sxxx (custom)
xMxx (custom)
xxxC (custom)
4.1 (custom)
5.0 (custom)
Exxx (custom)
Mxxx (custom)
Sxxx (custom)
xMxx (custom)
xxxC (custom)
R1.0 (custom)
R1.1 (custom)
R2.0 (custom)
R2.5 (custom)
R2.5 ATEX (custom)
R2.5 SP3 (custom)
R2.6 (custom)
R3.0 (custom)
R3.0 SP1 (custom)
R3.0 SP3 (custom)
2.6 V4F07x (custom)
3.0FP1 V4F11x (custom)
V4D02x (custom)
V4E0xx (custom)
3.x.x (custom)
2.x.x (custom)
4.x.x (custom)
1.1 (custom)
1.1 (custom)
Credits
ABB thanks Jos Wetzels from Midnight Blue (midnightblue.nl) for helping to identify the vulnerabilities and protecting our customers.
References
search.abb.com/...guageCode=en&DocumentPartId=&Action=Launch