System 800xA affected by 3rd party component vulnerabilities
ABB System 800xA includes vulnerable third-party components: 7-Zip version 18.5 (CWE-59, CWE-476, CWE-122, CWE-22, CWE-693, CWE-835, CWE-191, CWE-125, CWE-787, CWE-754, CWE-284) and Microsoft Azure Data Studio version 1.32. These vulnerabilities are actively exploited in the wild. 7-Zip can be exploited if an attacker tricks a user into extracting a malicious file or if the attacker gains system access. Azure Data Studio vulnerability requires system access and improper AAA configuration. The vulnerabilities pose a risk primarily if the third-party software is actually installed and used; they may appear in vulnerability scans of installation media but cannot be exploited if the software is uninstalled. Uninstallation completely eliminates the risk and does not impact 800xA functionality. Azure Data Studio is automatically removed in System 800xA 7.0 and later.
- User interaction: user must extract a malicious file via 7-Zip or click a malicious link
- OR: Attacker gains initial access to the engineering workstation or server
- Azure Data Studio vulnerability: requires improperly configured Authentication, Authorization, and Accountability (AAA) settings
/api/v1/advisories/21db9514-970a-4d28-9349-8c1346d772ecGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.