A path-traversal vulnerability has been found in ABB Totalflow circulate computer systems and controllers that would result in code injection and arbitrary code execution (ACE).
The high-risk vulnerability (tracked CVE-2022-0902) has a CVSS v3 of 8.1 and affected a number of ABB G5 merchandise. It has been found by safety specialists at Team82, Claroty’s analysis arm.
“Attackers can exploit this flaw to realize root entry on an ABB circulate pc, learn and write information, and remotely execute code,” the corporate wrote in an advisory printed on Tuesday.
Specifically, attackers may attempt to exploit the vulnerability by making a specifically crafted message and sending it to an affected system node.
The process would require the attacker to have entry to the system community, both immediately or via a wrongly configured or breached firewall. They might additionally set up malicious software program on a system node or infect the community itself with malicious software program.
Team82 has stated it disclosed the vulnerability to ABB, which promptly launched a firmware replace that resolves the vulnerability in a number of product variations.
“The replace removes the vulnerability by modifying the best way that the Totalflow protocol validates messages and verifies enter information,” ABB defined.
The advisory additionally recommends community segmentation as a mitigation technique.
“To mitigate this vulnerability, the ABB gadget ought to solely be related to a community phase that restricts entry to licensed customers,” reads the ABB technical write-up. “The vulnerability is barely uncovered when the attacker has entry to the community the place the ABB gadget is operating Totalflow TCP protocol.”
Additional mitigation methods embrace putting in bodily controls so no unauthorized personnel can entry gadgets and networks and scanning all information imported into environments earlier than use to detect potential malware infections.
A whole checklist of safety suggestions, alongside particulars about CVE-2022-0902, is out there within the authentic textual content of the ABB advisory.
The mitigation comes weeks after the Cybersecurity and Infrastructure Safety Company (CISA) issued a brand new report outlining cybersecurity efficiency targets (CPGs) for crucial infrastructure sectors.