ABB Panel Builder 800
ABB Panel Builder 800 is vulnerable to arbitrary code execution when a user opens a specially crafted project file. The vulnerability exists in all versions of Panel Builder 800. An attacker could craft a malicious file and send it to an engineer; when opened, the file would execute arbitrary code with the privileges of the user running Panel Builder 800. This requires social engineering to convince a user to open an untrusted file. No public exploits are known, and the vulnerability is not remotely exploitable. ABB is investigating this issue but has not yet released a corrected version.
- Local access to engineering workstation running Panel Builder 800
- User must open a specially crafted .pnl or project file (social engineering required)
- No elevated privileges required
- No authentication bypass needed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/039ded8b-aa77-4391-b9f3-ee13622565ddGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.