CVE-2019-7225

moderate-risk
Published 2019-06-27

The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.

Do I need to act?

-
0.22% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (16)

Cp620 Firmware
Cp620-Web Firmware
Cp630 Firmware
Cp630-Web Firmware
Cp635 Firmware
Cp635-B Firmware
Cp635-Web Firmware
Pb610 Firmware
Cp651-Web Firmware
Cp661 Firmware
Cp661-Web Firmware
Cp665 Firmware
Cp665-Web Firmware
Cp676 Firmware
Cp676-Web Firmware
Cp651 Firmware

Affected Vendors

Abb
46
/ 100
moderate-risk
Severity 27/34 · High
Exploitability 1/34 · Minimal
Exposure 18/34 · Moderate