Skip to main content

CVE-2024-13952: CWE-94: Improper Control of Generation of Code in ABB ASPECT-Enterprise

High
VulnerabilityCVE-2024-13952cvecve-2024-13952cwe-94
Published: Thu May 22 2025 (05/22/2025, 18:27:06 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Predictable filename vulnerabilities in ASPECT may expose sensitive information to a potential attacker if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:11:46 UTC

Technical Analysis

CVE-2024-13952 is a high-severity vulnerability identified in ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products up to version 3.*. The vulnerability is classified under CWE-94, which pertains to improper control of code generation. Specifically, the issue involves predictable filename vulnerabilities that may expose sensitive information if an attacker gains access to administrator credentials. This flaw allows an attacker with high privileges and partial user interaction to potentially manipulate or predict filenames used by the system, which can lead to unauthorized code execution or disclosure of sensitive data. The CVSS 4.0 score of 8.7 reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, and the requirement for privileged authentication. The vulnerability impacts confidentiality, integrity, and availability with high scope and impact, indicating that exploitation could lead to significant compromise of the affected systems. Although no known exploits are currently in the wild, the vulnerability's characteristics suggest that it could be leveraged in targeted attacks against industrial control systems or enterprise environments using ABB's products. ABB's ASPECT-Enterprise and related series are typically used in industrial automation and control environments, making this vulnerability particularly concerning for critical infrastructure sectors.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities, this vulnerability poses a significant risk. ABB products like ASPECT-Enterprise are widely deployed in industrial control systems across Europe. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial processes, or even remote code execution within control environments. This could result in operational downtime, safety hazards, financial losses, and damage to reputation. Given the high privileges required for exploitation, the threat is elevated if administrator credentials are compromised through phishing, insider threats, or other means. The vulnerability's potential to affect confidentiality, integrity, and availability simultaneously makes it a critical concern for organizations reliant on ABB's control systems. Additionally, the interconnected nature of industrial networks in Europe increases the risk of lateral movement and broader impact if exploited.

Mitigation Recommendations

Organizations should prioritize the following specific mitigation steps: 1) Immediately apply any patches or updates provided by ABB once available, as no patch links are currently listed. 2) Enforce strict access controls and multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. 3) Conduct thorough audits of existing administrator credentials and revoke or rotate any that are outdated or potentially exposed. 4) Implement network segmentation to isolate ABB control systems from general IT networks, limiting exposure to external threats. 5) Monitor logs and network traffic for unusual filename access patterns or attempts to exploit predictable filenames. 6) Employ application whitelisting and code integrity verification mechanisms to detect and prevent unauthorized code execution. 7) Train staff on phishing and social engineering risks to reduce the likelihood of credential theft. 8) Develop and test incident response plans specifically addressing industrial control system compromises. These targeted actions go beyond generic advice by focusing on the unique aspects of this vulnerability and the operational context of ABB products.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-05-08T12:07:22.375Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f6ee00acd01a2492646d2

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:11:46 AM

Last updated: 8/10/2025, 12:29:24 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats