
CVE-2023-3324 – Insecure deserialization in zenon internal DLLs
https://notcve.org/view.php?id=CVE-2023-3324
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-502: Deserialization of Untrusted Data •

CVE-2023-3323 – Code Execution through overwriting project file on zenon engineering studio system
https://notcve.org/view.php?id=CVE-2023-3323
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-276: Incorrect Default Permissions •

CVE-2023-3322 – Code Execution through overwriting service executable in utilities directory
https://notcve.org/view.php?id=CVE-2023-3322
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-3321 – Code Execution through Writable Mosquitto Configuration File
https://notcve.org/view.php?id=CVE-2023-3321
24 Jul 2023 — A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404. A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001801&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.194142766.2067879716.1690216773-1911411808.1686627590 • CWE-15: External Control of System or Configuration Setting •

CVE-2022-34838 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34838
24 Aug 2022 — Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add or alter data points and corresponding attributes. Once such engineering data is used the data visualization will be altered for the end user. Una vulnerabilidad de Almacenamiento de Contraseñas en un Formato Recuperable en ABB Zenon versión 8.20, permite que un atacante que explote con éxito la vulnerabilidad pueda añadir o alterar puntos de datos y los atributos c... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •

CVE-2022-34836 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34836
24 Aug 2022 — Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon system and user also can add own log messages and e.g., flood the log entries. An attacker who successfully exploit the vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc. Una vulnerabilidad de Salto de Ruta Relativo en ABB Zenon versión 8.20, permite al usuario acceder a archivos en el sistema Zenon y el usuario también puede añ... • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVE-2022-34837 – ABB Ability TM Operations Data Management Zenon Zenon Log Server file access control
https://notcve.org/view.php?id=CVE-2022-34837
24 Aug 2022 — Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add more network clients that may monitor various activities of the Zenon. Una vulnerabilidad de Almacenamiento de Contraseñas en un Formato Recuperable en ABB Zenon versión 8.20, permite que un atacante que explote con éxito la vulnerabilidad pueda añadir más clientes de red que puedan monitorizar varias actividades del Zenon. • https://search.abb.com/library/Download.aspx?DocumentID=2NGA001479&LanguageCode=en&DocumentPartId=&Action=Launch • CWE-257: Storing Passwords in a Recoverable Format CWE-522: Insufficiently Protected Credentials •

CVE-2019-15638
https://notcve.org/view.php?id=CVE-2019-15638
04 Dec 2019 — COPA-DATA zenone32 zenon Editor through 8.10 has an Uncontrolled Search Path Element. COPA-DATA zenone32 zenon Editor versiones hasta la versión 8.10, tiene un Elemento de Ruta de Búsqueda No Controlada. • https://forum.copadata.com • CWE-427: Uncontrolled Search Path Element •

CVE-2011-4533
https://notcve.org/view.php?id=CVE-2011-4533
10 Feb 2012 — zenAdminSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted packet to TCP port 50777, aka Reference Number 25240. zenAdminSrv.exe en Ing. Punzenberger COPA-DATA zenon 6.51 SP0 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de un paquete manipulado sobre el puerto 50777 (TCP), también conocido como re... • http://secunia.com/advisories/47892 •

CVE-2011-4534
https://notcve.org/view.php?id=CVE-2011-4534
10 Feb 2012 — ZenSysSrv.exe in Ing. Punzenberger COPA-DATA zenon 6.51 SP0 allows remote attackers to cause a denial of service (service crash) or possibly execute arbitrary code via a series of connections and disconnections on TCP port 1101, aka Reference Number 25212. ZenSysSrv.exe En Ing. Punzenberger COPA-DATA zenon V6.51 SP0 permite a atacantes remotos provocar una denegación de servicio (caída del servicio) o posiblemente ejecutar código de su elección a través de una serie de conexiones y desconexiones sobre el pu... • http://secunia.com/advisories/47892 •