Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Flaws Expose ABB Door Communication Systems to Attacks

Researchers discovered several critical vulnerabilities in door communication systems made by Switzerland-based industrial tech company ABB. Both patches and workarounds have been made available by the vendor.

Researchers discovered several critical vulnerabilities in door communication systems made by Switzerland-based industrial tech company ABB. Both patches and workarounds have been made available by the vendor.

The vulnerable product is the ABB IP Gateway (also sold under the Busch-Jaeger brand), a component of ABB’s door communication solutions, which include audio and video intercoms, fingerprint readers, and access code keypads. The IP Gateway provides the connection between the intercom, the local network and the mobile application that can be used to remotely monitor and control the system. The company’s solutions are used by organizations around the world.

According to a security advisory published recently by ABB, researchers Maxim Rupp and Florian Grunow of ERNW discovered several potentially serious vulnerabilities in the IP Gateway running firmware versions 3.39 and prior.Vulnerabilities found in ABB IP Gateway

Grunow discovered a remote code injection flaw that allows an attacker with access to the local network to take control of the targeted device. The vulnerability affects the local configuration web server and it can be exploited by sending specially crafted messages to the system.

Rupp identified a total of three vulnerabilities. One of them, CVE-2017-7931, allows an attacker to bypass authentication and access configuration files and application pages on the web server simply by navigating to their associated URL.

According to an advisory published by ICS-CERT, which Rupp has described to SecurityWeek as accurate, the configuration files that can be accessed by exploiting this flaw can contain passwords stored in clear text, an issue tracked as CVE-2017-7933. ABB’s advisory claims plaintext passwords can be obtained by an attacker from the user’s browser cookies following a successful login.

Finally, ABB IP Gateway is affected by a cross-site request forgery (CSRF) bug, tracked as CVE-2017-7906, that allows an attacker to conduct various actions on behalf of a legitimate user. These types of attacks can be carried out remotely, but they typically require some user interaction (e.g. clicking on a link, visiting a malicious webpage).

Register for SecurityWeek’s 2018 ICS Cyber Security Conference

ICS-CERT, whose advisory does not mention the issue identified by Grunow, has classified all the vulnerabilities as being critical or high severity.

ABB says it has patched the vulnerabilities with the release of firmware version 3.40. The company has also provided workarounds and noted that attacks can be mitigated by using security best practices for protecting a network against external attacks. The most important recommendation is that users ensure the web server cannot be accessed directly from the Internet.

The vendor is not aware of any attempts to exploit these vulnerabilities in the wild and noted that details of the security holes have not been made public.

Related: ABB Patches Password Flaws in Substation Automation Tool

Related: ICS Vendors Assessing Impact of Meltdown, Spectre Flaws

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.