CVE-2024-4007 (GCVE-0-2024-4007)
Vulnerability from cvelistv5
Published
2024-07-01 12:06
Modified
2024-08-01 20:26
CWE
Summary
Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:abb:aspect-ent-2_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "aspect-ent-2_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:aspect-ent-96_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "aspect-ent-96_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-2128-a_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-2128-a_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-2128-f_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-2128-f_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-2128_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-2128_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-2128-g_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-2128-g_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-264-a_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-264-a_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-264-f_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-264-f_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-264_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-264_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-264-g_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "nexus-264-g_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-3-2128_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-3-2128_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:nexus-3-264_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "nexus-3-264_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:matrix-11_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "matrix-11_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:matrix-216_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "matrix-216_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:matrix-232_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "matrix-232_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:matrix-264_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "matrix-264_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:aspect-ent-12_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "aspect-ent-12_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:aspect-ent-256_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "aspect-ent-256_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:abb:matrix-296_firmware:3.0.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "matrix-296_firmware",
            "vendor": "abb",
            "versions": [
              {
                "lessThan": "3.07.02",
                "status": "affected",
                "version": "3.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4007",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-02T19:33:48.062617Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-03T14:13:05.048Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:26:57.247Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/aspect-enterprise",
          "defaultStatus": "unaffected",
          "packageName": "Installer",
          "platforms": [
            "Linux"
          ],
          "product": "ASPECT Enterprise (ASP-ENT-x)",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "3.07"
            }
          ]
        },
        {
          "collectionURL": "https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/nexus-series",
          "defaultStatus": "unaffected",
          "packageName": "Installer",
          "platforms": [
            "Linux"
          ],
          "product": "NEXUS Series (NEX-2x, NEXUS-3-x)",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "3.07"
            }
          ]
        },
        {
          "collectionURL": "https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/matrix",
          "defaultStatus": "unaffected",
          "packageName": "Installer",
          "platforms": [
            "Linux"
          ],
          "product": "MATRIX Series(MAT-x)",
          "vendor": "ABB",
          "versions": [
            {
              "status": "affected",
              "version": "3.07"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "ABB likes to thank https://divd.nl for reporting the vulnerability in responsible disclosure."
        }
      ],
      "datePublic": "2024-07-01T03:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.\u003cbr\u003e"
            }
          ],
          "value": "Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-49",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-49 Password Brute Forcing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "USER",
            "Safety": "NEGLIGIBLE",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "RED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "DIFFUSE",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:L/U:Red",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "LOW"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1392",
              "description": "CWE-1392: Use of Default Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-02T00:10:15.764Z",
        "orgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
        "shortName": "ABB"
      },
      "references": [
        {
          "url": "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nABB Strongly recommends the following actions on any released SW version of ASPECT:\n- Change the PHPmyAdmin Password according to the system manual:\u0026nbsp; All customers who operate the ASPECT System with its default password are recommended to replace this default password with a unique, secure password, containing a\nmix of characters, numbers, and special characters with at least 10 characters in length.\n- Never expose open ports to the ASPECT product towards the Internet or any insecure network.\n- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).\nRecognize that VPNs may have vulnerabilities and should be updated to the most current version\navailable. Also, understand that VPNs are only as secure as the connected devices.\n- ABB recommends that customers shall apply the latest product update at the earliest convenience.\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "ABB Strongly recommends the following actions on any released SW version of ASPECT:\n- Change the PHPmyAdmin Password according to the system manual:\u00a0 All customers who operate the ASPECT System with its default password are recommended to replace this default password with a unique, secure password, containing a\nmix of characters, numbers, and special characters with at least 10 characters in length.\n- Never expose open ports to the ASPECT product towards the Internet or any insecure network.\n- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).\nRecognize that VPNs may have vulnerabilities and should be updated to the most current version\navailable. Also, understand that VPNs are only as secure as the connected devices.\n- ABB recommends that customers shall apply the latest product update at the earliest convenience."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Hard coded default credential contained in install package",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\nASPECT system shall not be connected directly to untrusted networks such as the Internet.\nIf remote access to an ASPECT system is a customer requirement, the system shall operate behind a firewall. User accessing ASPECT remotely shall do this using a VPN Gateway allowing access to the particular\nnetwork segment where ASPECT is installed and configured in.\nNote: it is crucial that the VPN Gateway and Network is setup in accordance with best industry standards and maintained in terms of security patches for all related components.\nAny default credentials shall be exchanged with a unique credential supporting adequate strength. \n\n\u003cbr\u003e"
            }
          ],
          "value": "ASPECT system shall not be connected directly to untrusted networks such as the Internet.\nIf remote access to an ASPECT system is a customer requirement, the system shall operate behind a firewall. User accessing ASPECT remotely shall do this using a VPN Gateway allowing access to the particular\nnetwork segment where ASPECT is installed and configured in.\nNote: it is crucial that the VPN Gateway and Network is setup in accordance with best industry standards and maintained in terms of security patches for all related components.\nAny default credentials shall be exchanged with a unique credential supporting adequate strength."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2b718523-d88f-4f37-9bbd-300c20644bf9",
    "assignerShortName": "ABB",
    "cveId": "CVE-2024-4007",
    "datePublished": "2024-07-01T12:06:53.048Z",
    "dateReserved": "2024-04-19T17:08:37.839Z",
    "dateUpdated": "2024-08-01T20:26:57.247Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-4007\",\"sourceIdentifier\":\"cybersecurity@ch.abb.com\",\"published\":\"2024-07-01T13:15:06.077\",\"lastModified\":\"2025-12-19T16:04:35.630\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.\"},{\"lang\":\"es\",\"value\":\"Credencial predeterminada en el paquete de instalaci\u00f3n en ABB ASPECT; NEXUS Series; MATRIX Series versi\u00f3n 3.07 permite a un atacante iniciar sesi\u00f3n en instancias de productos mal configuradas.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Red\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NEGLIGIBLE\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"LOW\",\"providerUrgency\":\"RED\"}}],\"cvssMetricV31\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cybersecurity@ch.abb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1392\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"E7160A7B-C86C-4B6F-9676-E609045DEB95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D3FE8A0-B7B1-496F-918B-83AECEC80486\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"33FFD0D5-84E8-4565-8CCC-41EBD13C3B33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6351DE-8170-4023-B815-536030F9236E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"55BD3450-6363-493A-B927-D0B799B2E5A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"125AAF0E-3CB2-4F5A-BA04-742918422422\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"D11512D2-4258-4187-B932-F0F2087B2655\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC1901E-7476-4070-B649-E2EAE52A38A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"2500228A-DCF9-4D53-860D-33F8E3A7FE39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CC44F95-4AE8-48B3-AC2C-6A4EB20F62DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"07E65B3D-584F-4ECA-8C02-2B6BD776BA64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653A6815-9BC7-4BD4-BB67-DBCC666ED860\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"B743E53A-C6B6-4458-A407-6C182E72147B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C07D72-CA89-40A1-8EE8-F48A06DB7992\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"4A7F70B4-F8D7-445A-9DD6-82D0F4F146FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E8A1A8-8476-4C36-A6F6-258C2DC60388\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"35AFA173-993C-4554-AE45-5978B047AE07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"699E0759-590A-4362-9B5B-F876C1A020D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"8EC23B51-E42E-47E4-9419-7C18DA2E568E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697D73AC-8567-4D25-B42F-FB584DAFF05F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"3EF3AC84-A778-4C20-BC7B-33E1338B9EAD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979B2BF4-885C-46B4-9093-E7CC35EBB397\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"6CDA2D7A-A68A-4495-B522-108105980AA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A14E33-5416-45D9-BBE4-61EFEC246E20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.07.02\",\"matchCriteriaId\":\"AB976E8E-A73C-4BC0-84C1-9ED555865C15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96BF51C6-E220-4347-9505-48DAE2BB26B7\"}]}]}],\"references\":[{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"cybersecurity@ch.abb.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T20:26:57.247Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-4007\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-02T19:33:48.062617Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:abb:aspect-ent-2_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"aspect-ent-2_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:aspect-ent-96_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"aspect-ent-96_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-2128-a_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-2128-a_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-2128-f_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-2128-f_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-2128_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-2128_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-2128-g_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-2128-g_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-264-a_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-264-a_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-264-f_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-264-f_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-264_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-264_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-264-g_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-264-g_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-3-2128_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-3-2128_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:nexus-3-264_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"nexus-3-264_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:matrix-11_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"matrix-11_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:matrix-216_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"matrix-216_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:matrix-232_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"matrix-232_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:matrix-264_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"matrix-264_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:aspect-ent-12_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"aspect-ent-12_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:aspect-ent-256_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"aspect-ent-256_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:o:abb:matrix-296_firmware:3.0.0:*:*:*:*:*:*:*\"], \"vendor\": \"abb\", \"product\": \"matrix-296_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.0.0\", \"lessThan\": \"3.07.02\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-03T14:01:53.880Z\"}}], \"cna\": {\"title\": \"Hard coded default credential contained in install package\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"ABB likes to thank https://divd.nl for reporting the vulnerability in responsible disclosure.\"}], \"impacts\": [{\"capecId\": \"CAPEC-49\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-49 Password Brute Forcing\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NEGLIGIBLE\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 8.7, \"Automatable\": \"NO\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:L/U:Red\", \"providerUrgency\": \"RED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"ABB\", \"product\": \"ASPECT Enterprise (ASP-ENT-x)\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.07\"}], \"platforms\": [\"Linux\"], \"packageName\": \"Installer\", \"collectionURL\": \"https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/aspect-enterprise\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"NEXUS Series (NEX-2x, NEXUS-3-x)\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.07\"}], \"platforms\": [\"Linux\"], \"packageName\": \"Installer\", \"collectionURL\": \"https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/nexus-series\", \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"ABB\", \"product\": \"MATRIX Series(MAT-x)\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.07\"}], \"platforms\": [\"Linux\"], \"packageName\": \"Installer\", \"collectionURL\": \"https://new.abb.com/low-voltage/de/produkte/gebaeudeautomation/produktsortiment/cylon/produkte/matrix\", \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"ABB Strongly recommends the following actions on any released SW version of ASPECT:\\n- Change the PHPmyAdmin Password according to the system manual:\\u00a0 All customers who operate the ASPECT System with its default password are recommended to replace this default password with a unique, secure password, containing a\\nmix of characters, numbers, and special characters with at least 10 characters in length.\\n- Never expose open ports to the ASPECT product towards the Internet or any insecure network.\\n- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).\\nRecognize that VPNs may have vulnerabilities and should be updated to the most current version\\navailable. Also, understand that VPNs are only as secure as the connected devices.\\n- ABB recommends that customers shall apply the latest product update at the earliest convenience.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nABB Strongly recommends the following actions on any released SW version of ASPECT:\\n- Change the PHPmyAdmin Password according to the system manual:\u0026nbsp; All customers who operate the ASPECT System with its default password are recommended to replace this default password with a unique, secure password, containing a\\nmix of characters, numbers, and special characters with at least 10 characters in length.\\n- Never expose open ports to the ASPECT product towards the Internet or any insecure network.\\n- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs).\\nRecognize that VPNs may have vulnerabilities and should be updated to the most current version\\navailable. Also, understand that VPNs are only as secure as the connected devices.\\n- ABB recommends that customers shall apply the latest product update at the earliest convenience.\\n\\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"datePublic\": \"2024-07-01T03:30:00.000Z\", \"references\": [{\"url\": \"https://search.abb.com/library/Download.aspx?DocumentID=9AKK108469A6101\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=Launch\"}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"ASPECT system shall not be connected directly to untrusted networks such as the Internet.\\nIf remote access to an ASPECT system is a customer requirement, the system shall operate behind a firewall. User accessing ASPECT remotely shall do this using a VPN Gateway allowing access to the particular\\nnetwork segment where ASPECT is installed and configured in.\\nNote: it is crucial that the VPN Gateway and Network is setup in accordance with best industry standards and maintained in terms of security patches for all related components.\\nAny default credentials shall be exchanged with a unique credential supporting adequate strength.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\\nASPECT system shall not be connected directly to untrusted networks such as the Internet.\\nIf remote access to an ASPECT system is a customer requirement, the system shall operate behind a firewall. User accessing ASPECT remotely shall do this using a VPN Gateway allowing access to the particular\\nnetwork segment where ASPECT is installed and configured in.\\nNote: it is crucial that the VPN Gateway and Network is setup in accordance with best industry standards and maintained in terms of security patches for all related components.\\nAny default credentials shall be exchanged with a unique credential supporting adequate strength. \\n\\n\u003cbr\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1392\", \"description\": \"CWE-1392: Use of Default Credentials\"}]}], \"providerMetadata\": {\"orgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"shortName\": \"ABB\", \"dateUpdated\": \"2024-07-02T00:10:15.764Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-4007\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T20:26:57.247Z\", \"dateReserved\": \"2024-04-19T17:08:37.839Z\", \"assignerOrgId\": \"2b718523-d88f-4f37-9bbd-300c20644bf9\", \"datePublished\": \"2024-07-01T12:06:53.048Z\", \"assignerShortName\": \"ABB\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…