Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.
Fixes

Solution

ABB Strongly recommends the following actions on any released SW version of ASPECT: - Change the PHPmyAdmin Password according to the system manual:  All customers who operate the ASPECT System with its default password are recommended to replace this default password with a unique, secure password, containing a mix of characters, numbers, and special characters with at least 10 characters in length. - Never expose open ports to the ASPECT product towards the Internet or any insecure network. - When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. - ABB recommends that customers shall apply the latest product update at the earliest convenience.


Workaround

ASPECT system shall not be connected directly to untrusted networks such as the Internet. If remote access to an ASPECT system is a customer requirement, the system shall operate behind a firewall. User accessing ASPECT remotely shall do this using a VPN Gateway allowing access to the particular network segment where ASPECT is installed and configured in. Note: it is crucial that the VPN Gateway and Network is setup in accordance with best industry standards and maintained in terms of security patches for all related components. Any default credentials shall be exchanged with a unique credential supporting adequate strength.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ABB

Published:

Updated: 2024-08-01T20:26:57.247Z

Reserved: 2024-04-19T17:08:37.839Z

Link: CVE-2024-4007

cve-icon Vulnrichment

Updated: 2024-08-01T20:26:57.247Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-01T13:15:06.077

Modified: 2024-11-21T09:42:01.227

Link: CVE-2024-4007

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.