ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (SQLite 3.2.4)
Act Now9.84hzm000604Mar 26, 2026
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
ABB Ability Camera Connect versions 2.0.0.42 and earlier bundle a vulnerable version of SQLite 3.2.4 that contains multiple memory corruption and injection vulnerabilities (CWE-787, CWE-89, CWE-125, CWE-120, and others). However, Camera Connect's actual exposure is limited because it does not use the vulnerable SQLite session extension (FTS3) component, requires adjacent network access and low-privilege credentials, and the vulnerability requires extreme resource parameters (multi-gigabyte string arguments) that exceed typical operational use. ABB recommends updating to version 2.0.0.49, which includes a patched SQLite version.
What this means
What could happen
ABB Ability Camera Connect versions 2.0.0.42 and earlier contain a critical vulnerability in the bundled SQLite library that could allow remote code execution. However, the actual exploitability is severely limited because Camera Connect does not use the vulnerable SQLite features (session extension/FTS3), requires network access to the same local segment, and requires valid low-privilege credentials.
Who's at risk
ABB Ability Camera Connect users (versions 2.0.0.42 and below) should apply this patch. This affects organizations using Camera Connect for video surveillance or monitoring in industrial facilities, particularly those without network segmentation between IT and OT environments.
How it could be exploited
An attacker on the same local network with valid low-privilege Camera Connect credentials could potentially trigger the vulnerability in the outdated SQLite 3.2.4 component, but this would require crafting database operations that utilize the session extension (which Camera Connect does not use). The practical attack path is blocked by architectural design choices in the product.
Prerequisites
- Network access on the same local network segment as Camera Connect
- Valid low-privilege user credentials for Camera Connect
- Access to craft specific SQLite session extension operations (not used by the product)
- Ability to send requests that exceed typical operational parameters (e.g., multi-gigabyte string arguments)
remotely exploitablecritical CVSS score (9.8)bundled third-party component with known vulnerabilitieslow actual exploitability due to architectural design (unused features)
Exploitability
High exploit probability (EPSS 51.9%)
Affected products (1)
ProductAffected VersionsFix Status
Ability Camera Connect <=2.0.0.42≤ 2.0.0.422.0.0.49
Remediation & Mitigation
0/3
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate ABB Ability Camera Connect to version 2.0.0.49 or later
Long-term hardening
0/2HARDENINGRestrict network access to Camera Connect to authorized personnel and devices on the same network segment using firewall rules or network segmentation (ISA-95 Level 2)
HARDENINGEnforce strong password policies and limit low-privilege account creation in Camera Connect to only necessary users
CVEs (25)
CVE-2023-7104CVE-2022-35737CVE-2020-15358CVE-2020-13632CVE-2020-13631CVE-2020-13630CVE-2020-13435CVE-2020-13434CVE-2020-11656CVE-2020-11655CVE-2019-19646CVE-2019-19645CVE-2018-20506CVE-2018-20505CVE-2018-20346CVE-2018-8740CVE-2017-10989CVE-2016-6153CVE-2015-6607CVE-2015-5895CVE-2015-3717CVE-2015-3416CVE-2015-3415CVE-2025-6965CVE-2025-3277
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/06ca5052-cde0-4a0b-b2a9-c7f1c53cd766