A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted
programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts.
This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.



Advisories
Source ID Title
EUVD EUVD EUVD-2023-43992 A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
Fixes

Solution

No solution given by the vendor.


Workaround

The BinaryFormatter class used in implementation of zenon runtime is considered unsafe, as it allows users to create arbitrary classes not limited to the classes the developer intended to deserialize. By deserializing user-controlled content, it may be possible for attackers may potentially load and run random code.  The mitigation steps are as follows: ▪ In the Engineering Studio application remove the .cdwpf files from the graphics folder of each project that contains .cdwpf files created by the 3D Configurator tool. ▪ On the system with the Engineering Studio, for each affected project, remove the RT folder containing the Service Engine files ▪ Compile new files in the Engineering Studio for each affected project ▪ On the system with the Service Engine, remove the RT folder of each affected project ▪ Transport to or place onto the system with the Service Engine the newly created Service Engine files that no longer contain the .cdwpf files • Note: the vulnerability only exists if the 3D configurator tool is used to generate .cdwpf files that are used in screens in projects for display of 3D models

History

Fri, 18 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ABB

Published:

Updated: 2024-10-18T13:02:53.261Z

Reserved: 2023-06-19T15:47:23.648Z

Link: CVE-2023-3324

cve-icon Vulnrichment

Updated: 2024-08-02T06:55:02.774Z

cve-icon NVD

Status : Modified

Published: 2023-07-24T18:15:23.717

Modified: 2024-11-21T08:17:01.000

Link: CVE-2023-3324

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.