| Summary | The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components. |
|---|---|
| Publication Date | June 28, 2019, 2:15 a.m. |
| Registration Date | Jan. 26, 2021, 11:44 a.m. |
| Last Update | Nov. 21, 2024, 1:47 p.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 5.8 |
|---|---|
| Vector | AV:A/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp620_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp620:-:*:*:*:*:*:*:* | ||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp620-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp620-web:-:*:*:*:*:*:*:* | ||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp630_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp630:-:*:*:*:*:*:*:* | ||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp630-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp630-web:-:*:*:*:*:*:*:* | ||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp635_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp635:-:*:*:*:*:*:*:* | ||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp635-b_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp635-b:-:*:*:*:*:*:*:* | ||||
| Configuration7 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp635-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp635-web:-:*:*:*:*:*:*:* | ||||
| Configuration8 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:pb610_firmware:*:*:*:*:*:*:*:* | 1.91 | 2.8.0.3674 | |||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:pb610:-:*:*:*:*:*:*:* | ||||
| Configuration9 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp651-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp651-web:-:*:*:*:*:*:*:* | ||||
| Configuration10 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp661_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp661:-:*:*:*:*:*:*:* | ||||
| Configuration11 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp661-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp661-web:-:*:*:*:*:*:*:* | ||||
| Configuration12 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp665_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp665:-:*:*:*:*:*:*:* | ||||
| Configuration13 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp665-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp665-web:-:*:*:*:*:*:*:* | ||||
| Configuration14 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp676_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp676:-:*:*:*:*:*:*:* | ||||
| Configuration15 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp676-web_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp676-web:-:*:*:*:*:*:*:* | ||||
| Configuration16 | or higher | or less | more than | less than | |
| cpe:2.3:o:abb:cp651_firmware:*:*:*:*:*:*:*:* | 1.76 | ||||
| execution environment | |||||
| 1 | cpe:2.3:h:abb:cp651:-:*:*:*:*:*:*:* | ||||
| Title | ABB HMI コンポーネントにおけるハードコードされた認証情報の使用に関する脆弱性 |
|---|---|
| Summary | ABB HMI コンポーネントには、ハードコードされた認証情報の使用に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | June 5, 2019, midnight |
| Registration Date | July 9, 2019, 6:06 p.m. |
| Last Update | July 10, 2019, 10:38 a.m. |
| ABB |
| CP620 ファームウェア |
| CP620-WEB ファームウェア |
| CP630 ファームウェア |
| CP630-WEB ファームウェア |
| CP635 ファームウェア |
| CP635-B ファームウェア |
| CP635-WEB ファームウェア |
| CP651-WEB ファームウェア |
| CP661 ファームウェア |
| PB610 ファームウェア |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2019年07月09日] 掲載 |
July 9, 2019, 6:06 p.m. |
| 2 | [2019年07月10日] 参考情報:ICS-CERT ADVISORY (ICSA-19-178-01) を追加 参考情報:ICS-CERT ADVISORY (ICSA-19-178-03) を追加 |
July 10, 2019, 5:09 p.m. |