Skip to main content

CVE-2024-51553: CWE-73: External Control of File Name or Path in ABB ASPECT-Enterprise

High
VulnerabilityCVE-2024-51553cvecve-2024-51553cwe-73
Published: Thu May 22 2025 (05/22/2025, 18:25:17 UTC)
Source: CVE
Vendor/Project: ABB
Product: ASPECT-Enterprise

Description

Predictable filename vulnerabilities in ASPECT may expose sensitive information to a potential attacker if administrator credentials become compromisedThis issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

AI-Powered Analysis

AILast updated: 07/08/2025, 07:12:34 UTC

Technical Analysis

CVE-2024-51553 is a high-severity vulnerability classified under CWE-73: External Control of File Name or Path, affecting ABB's ASPECT-Enterprise, NEXUS Series, and MATRIX Series products through version 3.*. The vulnerability arises from predictable filename handling within these systems, which could allow an attacker who has compromised administrator credentials to access sensitive information by exploiting the predictable nature of file paths or names. This flaw does not require user interaction but does require low-level privileges (administrator credentials) to exploit. The vulnerability impacts confidentiality significantly, as it can lead to unauthorized disclosure of sensitive files or data stored or processed by the affected ABB products. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N) indicates network attack vector, low attack complexity, partial attack type requiring privileges, no user interaction, and high impact on confidentiality, with no impact on integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects critical industrial control and enterprise management systems widely used in automation and infrastructure environments, making it a significant concern for organizations relying on ABB's ASPECT-Enterprise and related products.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially those in critical infrastructure sectors such as energy, manufacturing, and utilities where ABB's automation and control systems are prevalent. Exploitation could lead to unauthorized disclosure of sensitive operational data, intellectual property, or configuration files, potentially enabling further attacks or industrial espionage. Given the reliance on these systems for operational continuity, the exposure of sensitive information could also indirectly affect availability if attackers leverage the information for subsequent disruptive attacks. The requirement for administrator credentials limits the attack surface but also highlights the criticality of credential protection. European organizations with interconnected industrial control systems could face increased risk of targeted attacks, especially in countries with significant industrial bases and critical infrastructure.

Mitigation Recommendations

Organizations should immediately review and strengthen credential management practices, including enforcing multi-factor authentication (MFA) for administrator accounts and conducting thorough audits of account usage. Network segmentation should be implemented to isolate ABB systems from broader enterprise networks, reducing exposure to credential compromise. Monitoring and logging of file access and administrative actions on ASPECT-Enterprise and related systems should be enhanced to detect anomalous behavior indicative of exploitation attempts. Until official patches are released, consider implementing compensating controls such as restricting access to predictable file paths, applying strict file permissions, and using application-layer firewalls or intrusion detection systems to monitor for suspicious file access patterns. Regularly update and patch ABB products as soon as vendor fixes become available. Additionally, conduct targeted security awareness training for administrators managing these systems to reduce the risk of credential theft.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2024-10-29T11:48:58.139Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682f6ee00acd01a2492646da

Added to database: 5/22/2025, 6:37:20 PM

Last enriched: 7/8/2025, 7:12:34 AM

Last updated: 8/15/2025, 7:22:54 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats