Skip to main content

CVE-2024-13929: CWE-94 Improper Control of Generation of Code ('Code Injection') in ABB ASPECT-Enterprise

High
VulnerabilityCVE-2024-13929cvecve-2024-13929cwe-94
Published: Thu May 22 2025 (05/22/2025, 17:53:35 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Servlet injection vulnerabilities in ASPECT allow remote code execution if session administrator credentials become compromised. This issue affects ASPECT-Enterprise: through 3.08.03; NEXUS Series: through 3.08.03; MATRIX Series: through 3.08.03.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:24:57 UTC

Technical Analysis

CVE-2024-13929 is a high-severity vulnerability classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This vulnerability affects ABB's ASPECT-Enterprise software, including the NEXUS and MATRIX series up to version 3.08.03. The core issue is a servlet injection vulnerability that allows remote code execution (RCE) if an attacker obtains session administrator credentials. Specifically, the vulnerability arises from insufficient validation or sanitization of input that is used to generate or execute code within the servlet environment. An attacker with elevated privileges (session administrator) can exploit this flaw to execute arbitrary code remotely on the affected system without requiring user interaction. The CVSS 4.0 base score of 7.5 reflects a high severity level, indicating that the vulnerability is network exploitable (AV:N), requires low attack complexity (AC:L), and privileges at the administrator session level (PR:H). The impact on confidentiality, integrity, and availability is high (VC:H, VI:H, VA:H), meaning that successful exploitation can lead to full compromise of the affected system. The vulnerability does not require user interaction (UI:N) and does not involve scope changes (S:N). Although no known exploits are currently reported in the wild, the potential for damage is significant given the nature of the affected systems and the level of access required. ABB ASPECT-Enterprise is used in industrial automation and control environments, making this vulnerability particularly critical in operational technology (OT) contexts where disruption or unauthorized control can have severe consequences.

Potential Impact

For European organizations, the impact of CVE-2024-13929 is substantial, especially for those operating in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure. ABB's ASPECT-Enterprise and related series are commonly deployed in supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS). A successful remote code execution attack could allow adversaries to manipulate industrial processes, disrupt operations, cause physical damage, or exfiltrate sensitive operational data. The requirement for session administrator credentials means that initial compromise might occur through credential theft, phishing, or insider threats, but once obtained, attackers can leverage this vulnerability to escalate control. This poses a risk not only to operational continuity but also to safety and regulatory compliance under European frameworks such as NIS2 and GDPR if data confidentiality is breached. Additionally, the high integrity impact could lead to falsified process data or unauthorized command execution, potentially causing cascading failures or safety incidents. The availability impact could result in downtime or denial of service to critical industrial systems, affecting supply chains and essential services. Given the strategic importance of industrial automation in Europe’s economy and infrastructure, this vulnerability represents a critical risk vector that must be addressed promptly.

Mitigation Recommendations

To mitigate CVE-2024-13929 effectively, European organizations should implement a multi-layered approach beyond generic patching advice: 1) Immediate application of any available patches or updates from ABB once released, as the current information indicates no patch links yet. 2) Enforce strict access controls and monitoring on session administrator accounts, including multi-factor authentication (MFA) to reduce the risk of credential compromise. 3) Conduct thorough credential hygiene audits and rotate administrator credentials regularly. 4) Implement network segmentation to isolate ASPECT-Enterprise systems from broader corporate networks, limiting exposure to remote attacks. 5) Deploy intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous servlet requests or code injection attempts targeting ABB systems. 6) Monitor logs for unusual administrative session activity or unexpected code execution patterns. 7) Conduct regular security awareness training focused on phishing and credential theft risks for personnel with administrative access. 8) Consider application-layer firewalls or web application firewalls (WAF) to filter malicious input targeting servlet components. 9) Develop and test incident response plans specific to industrial control system compromises to ensure rapid containment and recovery. These targeted measures will help reduce the attack surface and mitigate the risk posed by this vulnerability until patches are fully deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-03-17T14:39:19.016Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f67ff0acd01a249264582

Added to database: 5/22/2025, 6:07:59 PM

Last enriched: 7/8/2025, 6:24:57 AM

Last updated: 8/11/2025, 8:02:01 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats