Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.
References
Link | Resource |
---|---|
https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
History
19 Sep 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 | |
Summary | (en) Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1. |
12 Jun 2023, 18:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch - Vendor Advisory | |
CPE | cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:* cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:* cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:* cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:* cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:* cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:* cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:* cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:* cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:* |
05 Jun 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-05 04:15
Updated : 2024-09-19 17:15
NVD link : CVE-2023-0636
Mitre link : CVE-2023-0636
CVE.ORG link : CVE-2023-0636
JSON object : View
Products Affected
abb
- matrix-264
- nexus-264
- matrix-216
- aspect-ent-2_firmware
- nexus-2128
- aspect-ent-2
- nexus-264-f
- aspect-ent-12_firmware
- matrix-232
- aspect-ent-12
- nexus-3-264_firmware
- nexus-2128-f
- nexus-264-f_firmware
- nexus-2128-f_firmware
- matrix-11_firmware
- nexus-264-a_firmware
- matrix-296
- aspect-ent-96
- nexus-264_firmware
- nexus-2128-a_firmware
- nexus-3-2128_firmware
- nexus-3-2128
- matrix-264_firmware
- matrix-296_firmware
- aspect-ent-256_firmware
- matrix-232_firmware
- aspect-ent-96_firmware
- matrix-11
- nexus-3-264
- matrix-216_firmware
- aspect-ent-256
- nexus-2128_firmware
- nexus-2128-a
- nexus-2128-g_firmware
- nexus-264-g_firmware
- nexus-264-g
- nexus-2128-g
- nexus-264-a
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')