Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Abb Subscribe
Total 135 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-22284 1 Abb 1 Opc Server For Ac 800m 2022-02-09 6.5 MEDIUM 8.8 HIGH
Incorrect Permission Assignment for Critical Resource vulnerability in OPC Server for AC 800M allows an attacker to execute arbitrary code in the node running the AC800M OPC Server.
CVE-2019-10953 5 Abb, Phoenixcontact, Schneider-electric and 2 more 20 Pm554-tp-eth, Pm554-tp-eth Firmware, Ilc 151 Eth and 17 more 2022-01-31 5.0 MEDIUM 7.5 HIGH
ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets.
CVE-2019-7229 1 Abb 15 Board Support Package Un31, Cp620, Cp620-web and 12 more 2022-01-01 5.4 MEDIUM 8.3 HIGH
The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
CVE-2019-18998 1 Abb 1 Asset Suite 2022-01-01 5.5 MEDIUM 7.1 HIGH
Insufficient access control in the web interface of ABB Asset Suite versions 9.0 to 9.3, 9.4 prior to 9.4.2.6, 9.5 prior to 9.5.3.2 and 9.6.0 enables full access to directly referenced objects. An attacker with knowledge of a resource's URL can access the resource directly.
CVE-2021-22279 1 Abb 2 Omnicore C30, Omnicore C30 Firmware 2021-12-16 9.3 HIGH 9.8 CRITICAL
A Missing Authentication vulnerability in RobotWare for the OmniCore robot controller allows an attacker to read and modify files on the robot controller if the attacker has access to the Connected Services Gateway Ethernet port.
CVE-2021-35533 1 Abb 2 Rtu500, Rtu500 Firmware 2021-11-30 7.1 HIGH 7.5 HIGH
Improper Input Validation vulnerability in the APDU parser in the Bidirectional Communication Interface (BCI) IEC 60870-5-104 function of Hitachi Energy RTU500 series allows an attacker to cause the receiving RTU500 CMU of which the BCI is enabled to reboot when receiving a specially crafted message. By default, BCI IEC 60870-5-104 function is disabled (not configured). This issue affects: Hitachi Energy RTU500 series CMU Firmware version 12.0.* (all versions); CMU Firmware version 12.2.* (all versions); CMU Firmware version 12.4.* (all versions).
CVE-2019-19107 2 Abb, Busch-jaeger 4 Tg\/s3.2, Tg\/s3.2 Firmware, 6186\/11 and 1 more 2021-11-03 2.1 LOW 5.5 MEDIUM
The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).
CVE-2019-19104 2 Abb, Busch-jaeger 4 Tg\/s3.2, Tg\/s3.2 Firmware, 6186\/11 and 1 more 2021-11-03 7.5 HIGH 9.8 CRITICAL
The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.
CVE-2021-22278 1 Abb 2 Pcm600, Update Manager 2021-11-03 4.6 MEDIUM 6.7 MEDIUM
A certificate validation vulnerability in PCM600 Update Manager allows attacker to get unwanted software packages to be installed on computer which has PCM600 installed.
CVE-2019-18250 1 Abb 2 Plant Connect, Power Generation Information Manager 2021-10-29 7.5 HIGH 9.8 CRITICAL
In all versions of ABB Power Generation Information Manager (PGIM) and Plant Connect, the affected product is vulnerable to authentication bypass, which may allow an attacker to remotely bypass authentication and extract credentials from the affected device.
CVE-2021-22272 2 Abb, Busch-jaeger 2 Mybuildings, Mybusch-jaeger 2021-10-08 9.0 HIGH 9.4 CRITICAL
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch
CVE-2020-24675 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 7.5 HIGH 9.8 CRITICAL
In S+ Operations and S+ History, it is possible that an unauthenticated user could inject values to the Operations History server (or standalone S+ History server) and ultimately write values to the controlled process.
CVE-2020-24677 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 6.5 MEDIUM 8.8 HIGH
Vulnerabilities in the S+ Operations and S+ Historian web applications can lead to a possible code execution and privilege escalation, redirect the user somewhere else or download unwanted data.
CVE-2020-24679 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 10.0 HIGH 9.8 CRITICAL
A S+ Operations and S+ Historian service is subject to a DoS by special crafted messages. An attacker might use this flaw to make it crash or even execute arbitrary code on the machine where the service is hosted.
CVE-2020-24678 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 6.5 MEDIUM 8.8 HIGH
An authenticated user might execute malicious code under the user context and take control of the system. S+ Operations or S+ Historian database is affected by multiple vulnerabilities such as the possibility to allow remote authenticated users to gain high privileges.
CVE-2020-24683 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 7.5 HIGH 9.8 CRITICAL
The affected versions of S+ Operations (version 2.1 SP1 and earlier) used an approach for user authentication which relies on validation at the client node (client-side authentication). This is not as secure as having the server validate a client application before allowing a connection. Therefore, if the network communication or endpoints for these applications are not protected, unauthorized actors can bypass authentication and make unauthorized connections to the server application.
CVE-2020-24680 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 4.6 MEDIUM 7.0 HIGH
In S+ Operations and S+ Historian, the passwords of internal users (not Windows Users) are encrypted but improperly stored in a database.
CVE-2020-24674 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 9.0 HIGH 8.8 HIGH
In S+ Operations and S+ Historian, not all client commands correctly check user permission as expected. Authenticated but Unauthorized remote users could execute a Denial-of-Service (DoS) attack, execute arbitrary code, or obtain more privilege than intended on the machines.
CVE-2020-24673 1 Abb 2 Symphony \+ Historian, Symphony \+ Operations 2021-10-07 7.5 HIGH 9.8 CRITICAL
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
CVE-2021-22276 1 Abb 10 System Access Point 127v, System Access Point 127v Firmware, System Access Point 2.0 and 7 more 2021-10-06 4.3 MEDIUM 5.5 MEDIUM
The vulnerability allows a successful attacker to bypass the integrity check of FW uploaded to the free@home System Access Point.