In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-18595 In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-16T23:51:37.486Z

Reserved: 2017-06-14T00:00:00

Link: CVE-2017-9664

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-24T20:29:00.257

Modified: 2024-11-21T03:36:36.617

Link: CVE-2017-9664

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.