Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8476— ABB Central Licensing System - Elevation of Privilege Vulnerability

CVSS 5.3 · Medium EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-8476

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ABB Central Licensing System - Elevation of Privilege Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to alter licenses assigned to the system nodes by sending specially crafted messages to the CLS web service.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款ABB产品输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ABB Ability System 800xA等都是瑞士ABB公司的产品。ABB Ability System 800xA是一套用于工控行业的分布式控制系统。ABB Compact HMI是一套监控和数据采集系统。ABB Control Builder Safe是一款用于配置和下载AC 800M High Integrity安全应用程序的工程工具。 多款ABB产品中的Central Licensing Server组件存在输入验证错误漏洞。攻击者可通过发送特制的消息利用该漏洞修改分配到系统节点的许可证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

II. Public POCs for CVE-2020-8476

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-8476

登录查看更多情报信息。

Same Patch Batch · ABB · 2020-04-29 · 13 CVEs total

CVE-2020-84819.8 CRITICALABB Central Licensing System - Information disclosure
CVE-2020-84799.4 CRITICALABB Central Licensing System - XML External Entity Injection
CVE-2020-84897.8 HIGHABB System 800xA Inter process communication vulnerability - 800xA Information Management
CVE-2020-84887.8 HIGHABB System 800xA Inter process communication vulnerability - 800xA Batch Management
CVE-2020-84857.8 HIGHABB System 800xA Inter process communication vulnerability - 800xA for Mod 300
CVE-2020-84847.8 HIGHABB System 800xA Inter process communication vulnerability - 800xA for DCI
CVE-2020-84717.8 HIGHABB Central Licensing System - Weak File Permissions
CVE-2020-84876.6 MEDIUMABB System 800xA Inter process communication vulnerability - System 800xA Base
CVE-2020-84866.6 MEDIUMABB System 800xA Inter process communication vulnerability - 800xA RNRP
CVE-2020-84785.3 MEDIUMABB System 800xA Inter process communication vulnerability
CVE-2020-84755.3 MEDIUMABB Central Licensing System - Denial of Service Vulnerability
CVE-2019-5620ABB MicroSCADA Pro SYS600 Missing Authentication for Critical Function

IV. Related Vulnerabilities

V. Comments for CVE-2020-8476

No comments yet


Leave a comment