CVE-2023-0636

Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
References () https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch - Vendor Advisory () https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch - Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.2

19 Sep 2024, 17:15

Type Values Removed Values Added
CWE CWE-20 CWE-77
Summary (en) Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1. (en) Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.

12 Jun 2023, 18:50

Type Values Removed Values Added
CPE cpe:2.3:h:abb:aspect-ent-96:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:matrix-216_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-3-264:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:aspect-ent-2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-3-2128:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-3-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-f:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-264-f_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-216:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-a:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:matrix-232_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:matrix-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-2128-g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-232:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-12:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:aspect-ent-256_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-264-g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-3-2128_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:matrix-296_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-2:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:aspect-ent-12_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:matrix-11_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-264:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:aspect-ent-96_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-f:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-2128-a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:aspect-ent-256:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-264-a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-a:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-296:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128-g:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-2128:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-2128-f_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-264_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:nexus-264-g:-:*:*:*:*:*:*:*
cpe:2.3:h:abb:matrix-11:-:*:*:*:*:*:*:*
cpe:2.3:o:abb:nexus-2128_firmware:*:*:*:*:*:*:*:*
First Time Abb nexus-264
Abb aspect-ent-2 Firmware
Abb
Abb aspect-ent-2
Abb nexus-2128-g
Abb aspect-ent-96
Abb nexus-2128 Firmware
Abb nexus-264-f
Abb nexus-2128-a Firmware
Abb aspect-ent-256
Abb nexus-264-g
Abb nexus-2128-f
Abb matrix-11
Abb matrix-232
Abb nexus-264-a Firmware
Abb aspect-ent-12 Firmware
Abb matrix-11 Firmware
Abb nexus-2128-f Firmware
Abb aspect-ent-12
Abb nexus-264 Firmware
Abb matrix-264
Abb matrix-296 Firmware
Abb nexus-264-g Firmware
Abb nexus-2128
Abb nexus-2128-g Firmware
Abb matrix-264 Firmware
Abb nexus-3-2128
Abb nexus-264-f Firmware
Abb aspect-ent-256 Firmware
Abb aspect-ent-96 Firmware
Abb nexus-3-264 Firmware
Abb nexus-264-a
Abb matrix-232 Firmware
Abb matrix-296
Abb nexus-3-264
Abb nexus-2128-a
Abb matrix-216 Firmware
Abb nexus-3-2128 Firmware
Abb matrix-216
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References (MISC) https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch - (MISC) https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch - Vendor Advisory

05 Jun 2023, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-05 04:15

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0636

Mitre link : CVE-2023-0636

CVE.ORG link : CVE-2023-0636


JSON object : View

Products Affected

abb

  • aspect-ent-12_firmware
  • matrix-296
  • nexus-2128-a_firmware
  • matrix-296_firmware
  • nexus-264-a_firmware
  • nexus-2128-g_firmware
  • matrix-11_firmware
  • matrix-216
  • aspect-ent-256_firmware
  • nexus-3-264_firmware
  • aspect-ent-2_firmware
  • aspect-ent-256
  • matrix-264
  • nexus-3-2128_firmware
  • nexus-2128-a
  • matrix-264_firmware
  • matrix-11
  • nexus-2128-g
  • nexus-264-a
  • nexus-2128_firmware
  • nexus-264-f_firmware
  • aspect-ent-96_firmware
  • nexus-2128-f_firmware
  • aspect-ent-2
  • nexus-264
  • nexus-2128-f
  • nexus-3-2128
  • nexus-264_firmware
  • matrix-216_firmware
  • aspect-ent-96
  • nexus-3-264
  • nexus-264-g_firmware
  • nexus-264-f
  • nexus-264-g
  • matrix-232_firmware
  • matrix-232
  • nexus-2128
  • aspect-ent-12
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')