Skip to main content

CVE-2024-13958: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in ABB ASPECT-Enterprise

Medium
VulnerabilityCVE-2024-13958cvecve-2024-13958cwe-79
Published: Thu May 22 2025 (05/22/2025, 18:36:50 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Stored Cross Site Scripting vulnerabilities exist in ASPECT if administrator creden-tials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:26:04 UTC

Technical Analysis

CVE-2024-13958 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products up to version 3.*. Stored XSS occurs when malicious input is improperly neutralized and then stored by the application, later being served to users without adequate sanitization. In this case, the vulnerability specifically requires that administrator credentials be compromised first, indicating that an attacker must have high-level privileges to inject malicious scripts into the web interface. Once injected, these scripts can execute in the context of other users who access the affected pages, potentially leading to session hijacking, unauthorized actions, or data theft. The CVSS 4.0 base score of 4.6 (medium severity) reflects that the attack vector is network-based with low attack complexity, no privileges required for exploitation (though the description states admin credentials are needed, the CVSS vector indicates PR:H, meaning high privileges are required), and user interaction is required. The impact on confidentiality and integrity is low to limited, with no direct impact on availability. The vulnerability affects multiple ABB industrial control system (ICS) products widely used in critical infrastructure and manufacturing environments. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on compensating controls for now.

Potential Impact

For European organizations, particularly those operating critical infrastructure, manufacturing plants, or utilities that deploy ABB ASPECT-Enterprise and related products, this vulnerability poses a moderate risk. If an attacker gains administrator credentials—potentially through phishing, credential theft, or insider threats—they could inject malicious scripts that compromise the integrity of the management interface. This could lead to unauthorized commands, data leakage, or manipulation of control system configurations. Given the strategic importance of industrial control systems in Europe’s energy, transportation, and manufacturing sectors, exploitation could disrupt operations or erode trust in system integrity. However, the requirement for administrator credentials and user interaction limits the ease of exploitation, reducing the likelihood of widespread automated attacks. Still, targeted attacks against high-value European organizations could leverage this vulnerability to gain footholds or escalate privileges within ICS environments.

Mitigation Recommendations

1. Enforce strict access controls and multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. 2. Monitor and audit administrator activities closely to detect suspicious behavior indicative of credential misuse or injection attempts. 3. Implement web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting ABB ICS web interfaces. 4. Conduct regular security training for administrators to recognize phishing and social engineering attacks that could lead to credential theft. 5. Segregate ICS management networks from general enterprise networks to limit exposure. 6. Apply input validation and output encoding best practices on all web interface inputs, and deploy patches promptly once available from ABB. 7. Use Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the web interface. 8. Regularly review and update incident response plans to include scenarios involving web interface compromise in ICS environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2025-05-08T12:07:31.635Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f725b0acd01a24926479b

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:26:04 AM

Last updated: 8/17/2025, 1:54:44 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats