CVE-2024-48841
Remote Code Execution (RCE) Vulnerabilities
Severity Score
10.0
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
8
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
Network access can be used to execute arbitrary code with elevated privileges. This
issue affects FLXEON 9.3.4 and older.
Network access can be used to execute arbitrary code with elevated privileges. This issue affects FLXEON 9.3.4 and older.
ABB Cylon FLXeon version 9.3.4 is vulnerable to authenticated remote root code execution via the /api/users/password endpoint. An attacker with valid credentials can inject arbitrary system commands by manipulating the newPassword PUT parameter. The issue arises in users.js, where the new password is hashed and improperly escaped before being passed to ChildProcess.exec() within a usermod command, allowing out of band (blind) command injection.
*Credits:
ABB likes to thank Gjoko Krstikj, Zero Science Lab, for reporting the vulnerabilities in responsible disclosure.
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-08 CVE Reserved
- 2025-01-27 CVE Published
- 2025-02-03 First Exploit
- 2025-02-14 CVE Updated
- 2025-04-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108470A5684&LanguageCode=en&DocumentPartId=PDF&Action=Launch |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/188963 | 2025-02-03 | |
https://packetstorm.news/files/id/188962 | 2025-02-03 | |
https://packetstorm.news/files/id/188961 | 2025-02-03 | |
https://packetstorm.news/files/id/188960 | 2025-02-03 | |
https://packetstorm.news/files/id/188993 | 2025-02-04 | |
https://packetstorm.news/files/id/188992 | 2025-02-04 | |
https://www.exploit-db.com/exploits/52188 | 2025-04-11 | |
https://www.exploit-db.com/exploits/52186 | 2025-04-11 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|