9.1
CVE-2024-48847
- EPSS 0.09%
- Veröffentlicht 05.12.2024 13:15:07
- Zuletzt bearbeitet 27.02.2025 15:45:57
- Quelle cybersecurity@ch.abb.com
- Teams Watchlist Login
- Unerledigt Login
MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes. Affected products: ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01; MATRIX Series v3.08.01
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Abb ≫ Aspect-ent-2 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-256 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-96 Firmware Version < 3.08.03
Abb ≫ Nexus-2128 Firmware Version < 3.08.03
Abb ≫ Nexus-2128-a Firmware Version < 3.08.03
Abb ≫ Nexus-2128-f Firmware Version < 3.08.03
Abb ≫ Nexus-2128-g Firmware Version < 3.08.03
Abb ≫ Nexus-264 Firmware Version < 3.08.03
Abb ≫ Nexus-264-a Firmware Version < 3.08.03
Abb ≫ Nexus-264-g Firmware Version < 3.08.03
Abb ≫ Nexus-3-2128 Firmware Version < 3.08.03
Abb ≫ Aspect-ent-12 Firmware Version <= 3.08.01
Abb ≫ Nexus-264-f Firmware Version < 3.08.03
Abb ≫ Nexus-3-264 Firmware Version <= 3.08.01
Abb ≫ Matrix-11 Firmware Version <= 3.08.01
Abb ≫ Matrix-216 Firmware Version <= 3.08.01
Abb ≫ Matrix-232 Firmware Version <= 3.08.01
Abb ≫ Matrix-264 Firmware Version <= 3.08.01
Abb ≫ Matrix-296 Firmware Version <= 3.08.01
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.09% | 0.271 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
cybersecurity@ch.abb.com | 8.8 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
cybersecurity@ch.abb.com | 8.2 | 3.9 | 4.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
|
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
The product uses a broken or risky cryptographic algorithm or protocol.
CWE-328 Use of Weak Hash
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).