Skip to main content

CVE-2024-13948: CWE-276 Incorrect Default Permissions in ABB ASPECT-Enterprise

Medium
VulnerabilityCVE-2024-13948cvecve-2024-13948cwe-276
Published: Thu May 22 2025 (05/22/2025, 18:15:31 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Windows permissions for ASPECT configuration toolsets are not fully secured allow-ing exposure of configuration informationThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:10:47 UTC

Technical Analysis

CVE-2024-13948 is a vulnerability identified in ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products, specifically affecting versions up to 3.*. The issue stems from incorrect default permissions (CWE-276) configured on Windows for the ASPECT configuration toolsets. These permissions are insufficiently restrictive, allowing unauthorized users with limited privileges on the system to access sensitive configuration information. The vulnerability does not require user interaction but does require low-level privileges (PR:L) on the affected system. The CVSS 4.0 score of 6.9 (medium severity) reflects a scenario where an attacker with local access and low privileges can gain high confidentiality impact by reading sensitive configuration data, with limited integrity and availability impact. The vulnerability affects the confidentiality of configuration files, which could include sensitive operational parameters, credentials, or network configurations, potentially aiding further attacks or unauthorized system manipulation. The vulnerability is not known to be exploited in the wild as of the publication date. The affected products are industrial control system (ICS) software suites used for process monitoring and control, making the exposure of configuration data a significant concern for operational security. The vulnerability is classified under CWE-276, indicating that the default permissions set on files or directories are too permissive, allowing unintended access.

Potential Impact

For European organizations using ABB's ASPECT-Enterprise, NEXUS, or MATRIX Series products, particularly in critical infrastructure sectors such as manufacturing, energy, utilities, and transportation, this vulnerability poses a risk of unauthorized disclosure of sensitive configuration data. Exposure of such data can facilitate lateral movement within industrial networks, enable attackers to understand system architecture, and potentially prepare for more damaging attacks such as sabotage or data manipulation. Given the critical nature of ICS environments, even a medium severity vulnerability can have outsized operational impacts. Confidentiality breaches could lead to loss of intellectual property or operational secrets, while indirectly increasing the risk of availability or integrity attacks. The requirement for local access with low privileges limits remote exploitation but does not eliminate risk, especially in environments where multiple users have access to control systems or where attackers can gain initial footholds through other means. European organizations with interconnected ICS and IT networks may face increased risk of cascading effects if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-13948, European organizations should: 1) Immediately review and harden Windows file and directory permissions for ASPECT configuration toolsets, ensuring that only authorized administrative or operational personnel have access. 2) Implement strict access control policies on systems running ABB products, including the use of least privilege principles and role-based access controls to limit local user permissions. 3) Monitor and audit access to configuration files and directories to detect unauthorized access attempts. 4) Segregate ICS networks from general IT networks to reduce the risk of unauthorized local access. 5) Apply any patches or updates provided by ABB as soon as they become available, even though no patches are currently linked. 6) Conduct user training and awareness to prevent privilege escalation or misuse of local accounts. 7) Employ endpoint detection and response (EDR) solutions to identify suspicious activities related to configuration file access. 8) Regularly back up configuration data securely to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-05-08T12:07:16.190Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f6b520acd01a249264616

Added to database: 5/22/2025, 6:22:10 PM

Last enriched: 7/8/2025, 7:10:47 AM

Last updated: 7/30/2025, 4:09:07 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats