Multiple vulnerabilities in ABB IP Gateway



Published: 2018-06-06
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2017-7931
CVE-2017-7906
CVE-2017-7933
CWE-ID CWE-287
CWE-352
CWE-256
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IP Gateway
Hardware solutions / Routers for home users

Vendor ABB

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper authentication

EUVDB-ID: #VU13186

Risk: Low

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7931

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The vulnerability exists due to improper authentication. A remote attacker can access a specific uniform resource locator (URL) on the web server, obtain the configuration files and application pages without authentication.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IP Gateway: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-156-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Cross-site request forgery

EUVDB-ID: #VU13187

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7906

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform CSRF attack.

The weakness exists due to insufficient CSRF protections. A remote attacker can create a specially crafted HTML page or URL, trick the victim into visiting it, gain access to the system and perform arbitrary actions.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IP Gateway: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-156-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Unprotected Storage of Credentials

EUVDB-ID: #VU13188

Risk: Low

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-7933

CWE-ID: CWE-256 - Unprotected Storage of Credentials

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to the target system.

The vulnerability exists due to some configuration files contain passwords stored in plain-text. A remote attacker can obtain arbitrary data and gain unauthorized access to the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IP Gateway: All versions

External links

http://ics-cert.us-cert.gov/advisories/ICSA-18-156-01


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###