9.1

CVE-2024-48847

MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes. 
Affected products:


ABB ASPECT - Enterprise v3.08.01; 
NEXUS Series v3.08.01; 
MATRIX Series v3.08.01

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
AbbAspect-ent-2 Firmware Version < 3.08.03
   AbbAspect-ent-2 Version-
AbbAspect-ent-256 Firmware Version < 3.08.03
   AbbAspect-ent-256 Version-
AbbAspect-ent-96 Firmware Version < 3.08.03
   AbbAspect-ent-96 Version-
AbbNexus-2128 Firmware Version < 3.08.03
   AbbNexus-2128 Version-
AbbNexus-2128-a Firmware Version < 3.08.03
   AbbNexus-2128-a Version-
AbbNexus-2128-f Firmware Version < 3.08.03
   AbbNexus-2128-f Version-
AbbNexus-2128-g Firmware Version < 3.08.03
   AbbNexus-2128-g Version-
AbbNexus-264 Firmware Version < 3.08.03
   AbbNexus-264 Version-
AbbNexus-264-a Firmware Version < 3.08.03
   AbbNexus-264-a Version-
AbbNexus-264-g Firmware Version < 3.08.03
   AbbNexus-264-g Version-
AbbNexus-3-2128 Firmware Version < 3.08.03
   AbbNexus-3-2128 Version-
AbbAspect-ent-12 Firmware Version <= 3.08.01
   AbbAspect-ent-12 Version-
AbbNexus-264-f Firmware Version < 3.08.03
   AbbNexus-264-f Version-
AbbNexus-3-264 Firmware Version <= 3.08.01
   AbbNexus-3-264 Version-
AbbMatrix-11 Firmware Version <= 3.08.01
   AbbMatrix-11 Version-
AbbMatrix-216 Firmware Version <= 3.08.01
   AbbMatrix-216 Version-
AbbMatrix-232 Firmware Version <= 3.08.01
   AbbMatrix-232 Version-
AbbMatrix-264 Firmware Version <= 3.08.01
   AbbMatrix-264 Version-
AbbMatrix-296 Firmware Version <= 3.08.01
   AbbMatrix-296 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.271
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cybersecurity@ch.abb.com 8.8 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cybersecurity@ch.abb.com 8.2 3.9 4.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.

CWE-328 Use of Weak Hash

The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).