CVE-2020-24673

high-risk
Published 2020-12-22

In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.

Do I need to act?

-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (10)

Symphony \+ Historian
Symphony \+ Historian
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations
Symphony \+ Operations

Affected Vendors

Abb
50
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 2/34 · Minimal
Exposure 16/34 · Moderate