5.9
CVE-2023-3323
- EPSS 0.18%
- Published 24.07.2023 18:15:23
- Last modified 21.11.2024 08:17:00
- Source cybersecurity@ch.abb.com
- Teams watchlist Login
- Open Login
A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.18% | 0.398 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
cybersecurity@ch.abb.com | 5.9 | 0.4 | 5.5 |
CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
|
CWE-276 Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files.