CVE-2020-24673
22.12.2020, 22:15
In S+ Operations and S+ Historian, a successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. This can lead to a loss of confidentiality and data integrity or even affect the product behavior and its availability.
Vendor | Product | Version |
---|---|---|
abb | symphony_\+_historian | 3.0 |
abb | symphony_\+_historian | 3.1 |
abb | symphony_\+_operations | 1.1 |
abb | symphony_\+_operations | 2.0 |
abb | symphony_\+_operations | 2.1:sp1 |
abb | symphony_\+_operations | 2.1:sp2 |
abb | symphony_\+_operations | 3.0 |
abb | symphony_\+_operations | 3.1 |
abb | symphony_\+_operations | 3.2 |
abb | symphony_\+_operations | 3.3 |
𝑥
= Vulnerable software versions
References