
CVE-2023-3324 – Insecure deserialization in zenon internal DLLs
https://notcve.org/view.php?id=CVE-2023-3324
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-502: Deserialization of Untrusted Data •

CVE-2023-3323 – Code Execution through overwriting project file on zenon engineering studio system
https://notcve.org/view.php?id=CVE-2023-3323
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-276: Incorrect Default Permissions •

CVE-2023-3322 – Code Execution through overwriting service executable in utilities directory
https://notcve.org/view.php?id=CVE-2023-3322
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-3321 – Code Execution through Writable Mosquitto Configuration File
https://notcve.org/view.php?id=CVE-2023-3321
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-15: External Control of System or Configuration Setting •

CVE-2022-34838 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34838
24 Aug 2022 — Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add or alter data points and corresponding attributes. Once such engineering data is used the data visualization will be altered for the end user. Una vulnerabilidad de Almacenamiento de Contraseñas en un Formato Recuperable en ABB Zenon versión 8.20, permite que un atacante que explote con éxito la vulnerabilidad pueda añadir o alterar puntos de datos y los atributos c... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •

CVE-2022-34836 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34836
24 Aug 2022 — Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon system and user also can add own log messages and e.g., flood the log entries. An attacker who successfully exploit the vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc. Una vulnerabilidad de Salto de Ruta Relativo en ABB Zenon versión 8.20, permite al usuario acceder a archivos en el sistema Zenon y el usuario también puede añ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVE-2022-34837 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34837
24 Aug 2022 — Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add more network clients that may monitor various activities of the Zenon. Una vulnerabilidad de Almacenamiento de Contraseñas en un Formato Recuperable en ABB Zenon versión 8.20, permite que un atacante que explote con éxito la vulnerabilidad pueda añadir más clientes de red que puedan monitorizar varias actividades del Zenon. • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •