Skip to main content

CVE-2022-31218: CWE-59 Improper Link Resolution Before File Access ('Link Following') in ABB Drive Composer entry

Medium
Published: Wed Jun 15 2022 (06/15/2022, 18:48:17 UTC)
Source: CVE
Vendor/Project: ABB
Product: Drive Composer entry

Description

Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product.

AI-Powered Analysis

AILast updated: 06/23/2025, 04:36:04 UTC

Technical Analysis

CVE-2022-31218 is a vulnerability identified in ABB's Drive Composer entry software, specifically affecting version 2.0 and potentially other unspecified versions. The core issue is classified under CWE-59, which pertains to improper link resolution before file access, commonly referred to as 'link following.' This vulnerability allows a low-privileged attacker to exploit the Drive Composer installer’s "repair" operation to create and write arbitrary files anywhere on the file system with SYSTEM-level privileges, provided the targeted file does not already exist. The attack vector involves leveraging the installer’s repair functionality, which can be invoked by a user with limited permissions, to perform unauthorized file system modifications. Because the attacker can write files as SYSTEM, this could lead to privilege escalation, persistence mechanisms, or the planting of malicious payloads that could compromise the integrity and confidentiality of the system. The vulnerability does not require prior authentication beyond low-level user access, and no user interaction beyond invoking the repair operation is necessary. There are no known exploits in the wild at the time of this analysis, and no official patches have been linked or published by ABB. The vulnerability’s exploitation depends on the ability to run the repair operation, which is part of the installer, making it a local attack vector rather than remote. The improper handling of symbolic links or junction points likely facilitates this arbitrary file write, enabling the attacker to redirect file creation to sensitive locations. This vulnerability impacts the availability indirectly by potentially allowing attackers to disrupt normal operations through malicious file writes or system modifications.

Potential Impact

For European organizations utilizing ABB Drive Composer entry, particularly in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk. ABB products are widely deployed across Europe in industries such as energy, utilities, and manufacturing, where Drive Composer is used for configuring and managing drives. Exploitation could allow attackers to escalate privileges from a low-privileged user to SYSTEM, enabling them to manipulate system files, install persistent malware, or disrupt operations. This could lead to operational downtime, data integrity issues, and potential safety hazards in industrial environments. Confidentiality could be compromised if attackers plant backdoors or exfiltrate sensitive configuration data. Integrity is at risk due to unauthorized file modifications, and availability could be affected if critical system files are overwritten or corrupted. The local nature of the attack means that insider threats or attackers who have gained limited access could leverage this vulnerability to deepen their control. Given the strategic importance of industrial control systems in Europe’s economy and infrastructure, successful exploitation could have cascading effects on supply chains and critical services.

Mitigation Recommendations

1. Restrict access to the Drive Composer installer and its repair functionality strictly to trusted administrators and authorized personnel only, using role-based access controls and least privilege principles. 2. Monitor and audit the use of the installer’s repair operation to detect any unauthorized or unusual invocation attempts. 3. Implement file system monitoring to detect creation or modification of files in sensitive directories, especially those performed by the Drive Composer installer process. 4. Use application whitelisting to prevent unauthorized execution of installer components by low-privileged users. 5. Employ endpoint detection and response (EDR) solutions to identify suspicious behaviors related to privilege escalation or file system manipulation. 6. If possible, isolate systems running Drive Composer in segmented network zones to limit lateral movement in case of compromise. 7. Engage with ABB support to obtain any available patches or updates addressing this vulnerability and apply them promptly once released. 8. Educate users about the risks of running repair operations without proper authorization and enforce strict operational procedures. 9. Consider implementing additional OS-level protections such as mandatory integrity control or enhanced symbolic link protections to mitigate link-following exploits.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2022-05-19T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf34e0

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 4:36:04 AM

Last updated: 8/11/2025, 9:06:33 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats