#VU67053 Download of code without integrity check in TXpert Hub CoreTec 4


Published: 2022-09-07

Vulnerability identifier: #VU67053

Vulnerability risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2021-35532

CWE-ID: CWE-494

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
TXpert Hub CoreTec 4
Other software / Other software solutions

Vendor: Hitachi Energy

Description

The vulnerability allows a local user to compromise the affected system

The vulnerability exists due to software does not perform software integrity check when downloading updates within the file upload validation component. A local administrator can gain access to the system and obtain an account with sufficient privilege to then upload a malicious firmware to the product.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

TXpert Hub CoreTec 4: 2.0.0 - 2.2.1


External links
http://search.abb.com/library/Download.aspx?DocumentID=8DBD000080&LanguageCode=en&DocumentPartId=&Action=Launch&utm_campaign=&utm_content=2022.04_5763_Cybersecurity%20Advisory%20Update_May_03&utm_medium=email&utm_source=Eloqua


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability