ID CVE-2019-7229
Summary The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.
References
Vulnerable Configurations
  • cpe:2.3:a:abb:board_support_package_un31:*:*:*:*:*:*:*:*
    cpe:2.3:a:abb:board_support_package_un31:*:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp620_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp620_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp620-web_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp620-web_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp630_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp630_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp630-web_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp630-web_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp635_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp635_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp635-b_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp635-b_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:*
  • cpe:2.3:o:abb:cp635-web_firmware:1.76:*:*:*:*:*:*:*
    cpe:2.3:o:abb:cp635-web_firmware:1.76:*:*:*:*:*:*:*
  • cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*
    cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:*
CVSS
Base: 5.4 (as of 01-01-2022 - 20:17)
Impact:
Exploitability:
CWE CWE-494
CAPEC
  • Software Integrity Attack
    An attacker initiates a series of events designed to cause a user, program, server, or device to perform actions which undermine the integrity of software code, device data structures, or device firmware, achieving the modification of the target's integrity to achieve an insecure state.
  • Malicious Software Download
    An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
  • Malicious Manual Software Update
    An attacker introduces malicious code to the victim's system by altering the payload of a software update, allowing for additional compromise or site disruption at the victim location. These manual, or user-assisted attacks, vary from requiring the user to download and run an executable, to as streamlined as tricking the user to click a URL. Attacks which aim at penetrating a specific network infrastructure often rely upon secondary attack methods to achieve the desired impact. Spamming, for example, is a common method employed as an secondary attack vector. Thus the attacker has in his or her arsenal a choice of initial attack vectors ranging from traditional SMTP/POP/IMAP spamming and its varieties, to web-application mechanisms which commonly implement both chat and rich HTML messaging within the user interface.
  • Malicious Automated Software Update
    An attacker exploits a weakness in a server or client's process of delivering and verifying the integrity of code supplied by an update-providing server or mechanism to cause code of the attackers' choosing to be downloaded and installed as a software update. Attacks against automated update mechanisms involve attack vectors which are specific to the type of update mechanism, but typically involve two different attack strategies: redirection or spoofing. Redirection-based attacks exploit two layers of weaknesses in server or client software to undermine the integrity of the target code-base. The first weakness involves a failure to properly authenticate a server as a source of update or patch content. This type of weakness typically results from authentication mechanisms which can be defeated, allowing a hostile server to satisfy the criteria that establish a trust relationship. The second weakness is a systemic failure to validate the identity and integrity of code downloaded from a remote location, hence the inability to distinguish malicious code from a legitimate update. One predominate type of redirection attack requires DNS spoofing or hijacking of a domain name corresponding to an update server. The target software initiates an update request and the DNS request resolves the domain name of the update server to the IP address of the attacker, at which point the software accepts updates either transmitted by or pulled from the attackers' server. Attacks against DNS mechanisms comprise an initial phase of a chain of attacks that facilitate automated update hijacking attack, and such attacks have a precedent in targeted activities that have been as complex as DNS/BIND attacks of corporate infrastructures, to untargeted attacks aimed at compromising home broadband routers, as well as attacks involving the compromise of wireless access points, as well as 'evil twin' attacks coupled with DNS redirection. Due to the plethora of options open to the attacker in forcing name resolution to arbitrary servers the Automated Update Hijacking attack strategies are the tip of the spear for many multi-stage attack chains. The second weakness that is exploited by the attacker is the lack of integrity checking by the software in validating the update. Software which relies only upon domain name resolution to establish the identity of update code is particularly vulnerable, because this signals an absence of other security countermeasures that could be applied to invalidate the attackers' payload on basis of code identity, hashing, signing, encryption, and other integrity checking mechanisms. Redirection-based attack patterns work equally well against client-side software as well as local servers or daemons that provide software update functionality. One precedent of redirection-based attacks involves the active exploitation of Firefox extensions, such as the Google Toolbar, Yahoo Toolbar, Facebook Toolbar, and others. The second strategy employed in Automated Hijacking Attacks are spoofing strategies, including content or identity spoofing, as well as protocol spoofing. Content or identity spoofing attacks can trigger updates in software by embedding scripted mechanisms within a malicious web page, which masquerades as a legitimate update source. Scripting mechanisms communicate with software components and trigger updates from locations specified by the attackers' server. Such attacks have numerous precedents, one in particular being eTrust Antivirus Webscan Automated Update Remote Code Execution vulnerability (CVE-2006-3976) and (CVE-2006-3977) whereby an ActiveX control could be remotely manipulated by an attacker controlled web page to download and execute the attackers' code without integrity checking.
  • Malicious Software Update
    An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code believed to be a valid update that originates from an attacker controlled source. Although there are several variations to this strategy of attack, the attack methods are united in that all rely on the ability of an attacker to position and disguise malicious content such that it masquerades as a legitimate software update which is then processed by a program, undermining application integrity. As such the attack employs 'spoofing' techniques augmented by psychological or technological mechanisms to disguise the update and/or its source. Virtually all software requires frequent updates or patches, giving the attacker immense latitude when structuring the attack, as well as many targets of opportunity. Attacks involving malicious software updates can be targeted or untargeted in reference to a population of users, and can also involve manual and automatic means of payload installation. Untargeted attacks rely upon a mass delivery system such as spamming, phishing, or trojans/botnets to distribute emails or other messages to vast populations of users. Targeted attacks aim at a particular demographic or user population. Corporate Facebook or Myspace pages make it easy to target users of a specific company or affiliation without relying on email address harvesting or spamming. One phishing-assisted variation on this attack involves hosting what appears to be a software update, then harvesting actual email addresses for an organization, or generating commonly used email addresses, and then sending spam, phishing, or spear-phishing emails to the organization's users requesting that they manually download and install the malicious software update. This type of attack has also been conducted using an Instant Messaging virus payload, which harvests the names from a user's contact list and sends instant messages to those users to download and apply the update. While both methods involve a high degree of automated mechanisms to support the attack, the primary vector for achieving the installation of the update remains a manual user-directed process, although clicking a link within an IM client or web application may initiate the update. Other class of attacks focus on firmware, where malicious updates are made to the core system firmware or BIOS. Since this occurs outside the controls of the operating system, the OS detection and prevention mechanisms do not aid, thus allowing an adversary to evade defenses as well as gain persistence on the target's system. Automated attacks involving malicious software updates require little to no user-directed activity and are therefore advantageous because they avoid the complex preliminary setup stages of manual attacks, which must effectively 'hook' users while avoiding countermeasures such as spam filters or web security filters.
Access
VectorComplexityAuthentication
ADJACENT_NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:A/AC:M/Au:N/C:P/I:P/A:P
refmap via4
confirm
fulldisc 20190624 XL-19-005 - ABB HMI Absence of Signature Verification Vulnerability
misc
Last major update 01-01-2022 - 20:17
Published 24-06-2019 - 18:15
Last modified 01-01-2022 - 20:17
Back to Top