A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43992 | A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. |
Solution
No solution given by the vendor.
Workaround
The BinaryFormatter class used in implementation of zenon runtime is considered unsafe, as it allows users to create arbitrary classes not limited to the classes the developer intended to deserialize. By deserializing user-controlled content, it may be possible for attackers may potentially load and run random code. The mitigation steps are as follows: ▪ In the Engineering Studio application remove the .cdwpf files from the graphics folder of each project that contains .cdwpf files created by the 3D Configurator tool. ▪ On the system with the Engineering Studio, for each affected project, remove the RT folder containing the Service Engine files ▪ Compile new files in the Engineering Studio for each affected project ▪ On the system with the Service Engine, remove the RT folder of each affected project ▪ Transport to or place onto the system with the Service Engine the newly created Service Engine files that no longer contain the .cdwpf files • Note: the vulnerability only exists if the 3D configurator tool is used to generate .cdwpf files that are used in screens in projects for display of 3D models
Fri, 18 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: ABB
Published:
Updated: 2024-10-18T13:02:53.261Z
Reserved: 2023-06-19T15:47:23.648Z
Link: CVE-2023-3324
Updated: 2024-08-02T06:55:02.774Z
Status : Modified
Published: 2023-07-24T18:15:23.717
Modified: 2024-11-21T08:17:01.000
Link: CVE-2023-3324
No data.
OpenCVE Enrichment
No data.
EUVD