2PAA121231 - C - en - SECURITY Multiple Vulnerabilities in ABB Central Licensing System
2PAA121231 - C - en - SECURITY Multiple Vulnerabilities in ABB Central Licensing System
REVISION: C
DATE: 2 021-07-01
—
CYBERSECURITY ADVISORY
Notice
The information in this document is subject to change without notice, and should not be construed as a
commitment by ABB.
ABB provides no warranty, express or implied, including warranties of merchantability and fitness for a
particular purpose, for the information contained in this document, and assumes no responsibility for
any errors that may appear in this document. In no event shall ABB or any of its suppliers be liable for di-
rect, indirect, special, incidental or consequential damages of any nature or kind arising from the use of
this document, or from the use of any hardware or software described in this document, even if ABB or
its suppliers have been advised of the possibility of such damages.
This document and parts hereof must not be reproduced or copied without written permission from
ABB, and the contents hereof must not be imparted to a third party nor used for any unauthorized pur-
pose.
All rights to registrations and trademarks reside with their respective owners.
Affected products/components
ABB Central Licensing System (CLS) versions 5.1 to 6.1.
ABB CLS is not a standalone product but a common component that is exclusively distributed as part of
other ABB products. The following table lists all products that are using these versions of CLS and dis-
tribute CLS as part of their installation media.
Summary
ABB is aware that the ABB Central Licensing System contains several vulnerabilities which require user
attention. The above-mentioned products use CLS and are affected by the following vulnerabilities. The
table indicates which of the two installation types of CLS that are affected: Client-Server and
Standalone.
For some of the affected products the CVSS score may be lower. This is described in the advisories
listed in the section “Product specific cybersecurity advisories” below.
Install the updated virus definition files for the recommended / supported malware protection solution.
Vulnerability details
1. CVE-2020-8481: Information Disclosure vulnerability: Confidential data is written in an unprotected
file. An attacker who successfully exploited this vulnerability could take full control of the computer.
2. CVE-2020-8479: XML External Entity Injection vulnerability: An attacker who successfully exploited
the vulnerabilities could read or call arbitrary files from the license server and/or from the network
and may also block the license handling.
3. CVE-2020-8475: Denial of Service vulnerability: An attacker who successfully exploited this vulnerabil-
ity could block the license handling.
4. CVE-2020-8476: Elevation of privilege vulnerability: An attacker who successfully exploited this vul-
nerability in the license server could alter licenses assigned to the system nodes. This could poten-
tially lead to a situation where legitimate nodes in the system network are denied licenses.
5. CVE-2020-8471: Weak File Permissions: An authenticated attacker who successfully exploited this vul-
nerability, could block the license handling, escalate his/her privileges, and execute arbitrary code.
Exploitation of some of these vulnerabilities may block the license handling. The effect of this may differ
for different products. A usual behavior is that launching of engineering functions may be blocked and
that operator functions may still work but annoyance messages may be displayed. The product specific
cybersecurity advisories may describe the behavior in more detail.
– SECURITY ABB Central Licensing System Vulnerabilities, impact on System 800xA, Compact HMI and
Control Builder Safe (2PAA121230),
http://search.abb.com/library/Download.aspx?Documen-
tID=2PAA121230&LanguageCode=en&DocumentPartId=&Action=Launch
– SECURITY ABB Central Licensing System Vulnerabilities, impact on Symphony® Plus, Composer Har-
mony, Composer Melody, Harmony OPC Server (2PAA123981)
https://search.abb.com/library/Download.aspx?Documen-
tID=2PAA123981&LanguageCode=en&DocumentPartId=&Action=Launch
When this security advisory was issued, had these vulnerabilities been publicly
disclosed?
No, ABB received information about these vulnerabilities through responsible disclosure.
When this security advisory was issued, had ABB received any reports that these
vulnerabilities were being exploited?
No, ABB had not received any information indicating that these vulnerabilities have been exploited when
this security advisory was originally issued.
Acknowledgement
ABB thanks William Knowles and his colleagues at Applied Risk for helping to identify the vulnerabilities
and protecting our customers.
Support
For additional instructions and support please contact your local ABB service organization. For contact
information, see www.abb.com/contactcenters.
Information about ABB’s cybersecurity program and capabilities can be found at www.abb.com/cyber-
security.
Revisions
Rev. Page (P) Description Date
Chapt. (C)
A all New document 2020-03-30
B P2,P4 Revised Vulnerability details and CVSS score for 2020-04-21
CVE-2020-8479
C P2, P3, P6 Revised affected versions for S+ Operations, S+ Engi- 2021-06-30
neering and Composer Melody. Included updates availa-
ble for CVE-2020-8475 and CVE-2020-8476.