#VU26066 External Control of Critical State Data in eSOMS


Published: 2020-03-13

Vulnerability identifier: #VU26066

Vulnerability risk: Low

CVSSv3.1: 3.1 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-19092

CWE-ID: CWE-642

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
eSOMS
Client/Desktop applications / Office applications

Vendor: ABB

Description

The vulnerability allows a remote attacker to perform some alternations in the target system.

The vulnerability exists due to the affected software uses ASP.NET Viewstate without Message Authentication Code (MAC). Alterations to Viewstate might thus not be noticed.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

eSOMS: 4.0 - 6.0.2


External links
http://ics-cert.us-cert.gov/advisories/icsa-20-072-01
http://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability