Vulnerability identifier: #VU19012
Vulnerability risk: Medium
CVSSv3.1: 6.6 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
BSP UN31
Server applications /
SCADA systems
BSP UN30
Server applications /
SCADA systems
PB610 Panel Builder 600
Server applications /
SCADA systems
Vendor: ABB
Description
The vulnerability allows an attacker to perform directory traversal attacks.
The vulnerability exists due to the IDAL FTP server fails to ensure directory change requests do not change to locations outside of the root FTP directory. An authenticated attacker can simply traverse outside the server root directory by changing the directory.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
BSP UN31: All versions
BSP UN30: All versions
PB610 Panel Builder 600: 1.91 - 2.8.0.367
External links
http://www.us-cert.gov/ics/advisories/icsa-19-178-01
http://search-ext.abb.com/library/Download.aspx?DocumentID=3ADR010377&LanguageCode=en&a...
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.