Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13928: CWE-94 Improper Control of Generation of Code ('Code Injection') in ABB ASPECT-Enterprise

0
High
VulnerabilityCVE-2024-13928cvecve-2024-13928cwe-94
Published: Thu May 22 2025 (05/22/2025, 17:51:45 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

SQL injection vulnerabilities in ASPECT allow unintended access and manipulation of database repositories if session administrator credentials become compromised. This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:57:21 UTC

Technical Analysis

CVE-2024-13928 is a high-severity vulnerability identified in ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products up to version 3.08.03. The vulnerability is classified under CWE-94, indicating improper control of code generation, commonly known as code injection. Specifically, the issue manifests as an SQL injection vulnerability that allows an attacker to execute unauthorized SQL commands against the underlying database repositories. This vulnerability becomes exploitable if an attacker gains access to session administrator credentials, which then enables unintended access and manipulation of critical database contents. The CVSS 4.0 score of 7.5 reflects a high risk, with network attack vector, low attack complexity, partial authentication required (privileged user), and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as the attacker can read, modify, or delete sensitive data stored in the databases. The vulnerability affects core ABB industrial software used for enterprise and operational technology management, which often integrates with critical infrastructure systems. Although no known exploits are currently reported in the wild, the potential for exploitation remains significant given the nature of the vulnerability and the privileged access required. The lack of available patches at the time of reporting increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, the impact of CVE-2024-13928 is substantial, especially for those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure that rely on ABB's ASPECT-Enterprise and related products. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, manipulation or corruption of control system configurations, and disruption of industrial processes. This could result in operational downtime, financial losses, regulatory non-compliance, and damage to reputation. Given the integration of these products in supervisory control and data acquisition (SCADA) systems and enterprise resource planning (ERP) environments, the vulnerability could serve as a pivot point for broader network compromise. European organizations are subject to stringent data protection regulations such as GDPR, and breaches involving personal or operational data could lead to severe legal and financial penalties. Furthermore, the high integrity and availability impact could threaten safety and reliability in critical sectors, potentially affecting public safety and national security.

Mitigation Recommendations

To mitigate CVE-2024-13928 effectively, European organizations should implement a multi-layered approach: 1) Immediately restrict and monitor access to session administrator credentials, enforcing strict privilege management and multi-factor authentication to reduce the risk of credential compromise. 2) Conduct thorough audits of database access logs and application logs for unusual or unauthorized SQL queries indicative of injection attempts. 3) Apply input validation and sanitization controls at the application layer to prevent malicious SQL code execution, even if credentials are compromised. 4) Network segmentation should be enforced to isolate critical ABB systems from less secure network zones, limiting lateral movement. 5) Engage with ABB for timely updates or patches and prioritize their deployment once available. 6) Implement intrusion detection and prevention systems (IDPS) with signatures or heuristics tuned to detect SQL injection patterns targeting ABB products. 7) Conduct regular security training for administrators to recognize phishing or social engineering attempts that could lead to credential theft. 8) Develop and test incident response plans specifically addressing potential exploitation scenarios of this vulnerability to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-03-17T14:39:18.488Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f67ff0acd01a2492645a0

Added to database: 5/22/2025, 6:07:59 PM

Last enriched: 7/8/2025, 6:57:21 AM

Last updated: 11/22/2025, 8:13:37 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats