Skip to main content

CVE-2024-51552: CWE-257 Storing Passwords in a Recoverable Format in ABB ASPECT-Enterprise

High
VulnerabilityCVE-2024-51552cvecve-2024-51552cwe-257
Published: Thu May 22 2025 (05/22/2025, 18:38:38 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Weak password storage vulnerabilities exist in ASPECT if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:26:20 UTC

Technical Analysis

CVE-2024-51552 is a high-severity vulnerability affecting ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products up to version 3.*, where administrator credentials are stored in a recoverable format. This vulnerability falls under CWE-257, which concerns the improper storage of passwords in a manner that allows them to be retrieved in plaintext or easily reversible form. Specifically, the affected ABB products store administrator passwords in a way that, if an attacker gains access to the system or database, they can recover the original passwords rather than just hashed or irreversibly transformed values. The CVSS 4.0 score of 7.1 indicates a high impact with network attack vector, low attack complexity, and requiring privileges with high confidentiality impact. The vulnerability does not require user interaction but does require privileged access to exploit, which means an attacker would first need to compromise an account with elevated privileges or gain access to the system to extract stored credentials. The vulnerability affects multiple ABB industrial control and enterprise management systems, which are often used in critical infrastructure and industrial environments. Although no known exploits are currently in the wild, the recoverable password storage significantly increases the risk of credential theft and lateral movement within affected environments once initial access is gained. This vulnerability can lead to further compromise of the affected systems and potentially other connected networks due to the reuse or escalation of administrator credentials.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities that rely on ABB's ASPECT-Enterprise and related products, this vulnerability poses a significant risk. Compromise of administrator credentials can lead to unauthorized access to control systems, manipulation of industrial processes, and disruption of services. The recoverable password storage increases the likelihood of credential theft and subsequent attacks such as privilege escalation, lateral movement, and persistent access. This can result in operational downtime, safety hazards, data breaches, and regulatory non-compliance under frameworks like NIS2 and GDPR. Given the strategic importance of industrial control systems in Europe and the widespread use of ABB products, the vulnerability could have cascading effects on supply chains and critical services. Additionally, the high confidentiality impact means sensitive operational data could be exposed, further increasing the risk to European organizations.

Mitigation Recommendations

European organizations should immediately audit their ABB ASPECT-Enterprise, NEXUS, and MATRIX Series deployments to identify affected versions. Since no patches are currently available, organizations should implement compensating controls such as: 1) Restricting and monitoring access to systems storing administrator credentials to minimize the risk of privileged account compromise. 2) Enforcing strong network segmentation and zero-trust principles around industrial control systems to limit lateral movement opportunities. 3) Implementing multi-factor authentication (MFA) for all privileged accounts to reduce the risk of credential misuse. 4) Regularly rotating administrator passwords and using external vaults or hardware security modules (HSMs) for credential storage where possible. 5) Enhancing logging and anomaly detection to quickly identify suspicious access patterns or credential extraction attempts. 6) Engaging with ABB support for updates or patches and planning for timely deployment once available. 7) Conducting security awareness training focused on privileged account security for administrators and operators.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2024-10-29T11:48:58.139Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f725b0acd01a24926479d

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:26:20 AM

Last updated: 8/14/2025, 4:42:14 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats