7.7
CVE-2024-48844
- EPSS 0.85%
- Published 05.12.2024 13:15:06
- Last modified 27.02.2025 15:45:57
- Source cybersecurity@ch.abb.com
- Teams watchlist Login
- Open Login
Denial of Service vulnerabilities where found providing a potiential for device service disruptions. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
Data is provided by the National Vulnerability Database (NVD)
Abb ≫ Aspect-ent-2 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-256 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-96 Firmware Version < 3.08.03
Abb ≫ Nexus-2128 Firmware Version < 3.08.03
Abb ≫ Nexus-2128-a Firmware Version < 3.08.03
Abb ≫ Nexus-2128-f Firmware Version < 3.08.03
Abb ≫ Nexus-2128-g Firmware Version < 3.08.03
Abb ≫ Nexus-264 Firmware Version < 3.08.03
Abb ≫ Nexus-264-a Firmware Version < 3.08.03
Abb ≫ Nexus-264-g Firmware Version < 3.08.03
Abb ≫ Nexus-3-2128 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-12 Firmware Version < 3.08.03
Abb ≫ Nexus-264-f Firmware Version < 3.08.03
Abb ≫ Nexus-3-264 Firmware Version < 3.08.03
Abb ≫ Matrix-11 Firmware Version < 3.08.03
Abb ≫ Matrix-216 Firmware Version < 3.08.03
Abb ≫ Matrix-232 Firmware Version < 3.08.03
Abb ≫ Matrix-264 Firmware Version < 3.08.03
Abb ≫ Matrix-296 Firmware Version < 3.08.03
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.85% | 0.741 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
cybersecurity@ch.abb.com | 7.2 | 0 | 0 |
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
cybersecurity@ch.abb.com | 7.7 | 1.8 | 5.3 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.