ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.
Published 2020-04-29 23:15:13
Updated 2023-05-16 20:44:12
Source Rapid7, Inc.
View at NVD,   CVE.org

Products affected by CVE-2019-5620

Exploit prediction scoring system (EPSS) score for CVE-2019-5620

8.77%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2019-5620

  • ABB MicroSCADA wserver.exe Remote Code Execution
    Disclosure Date: 2013-04-05
    First seen: 2020-04-26
    exploit/windows/scada/abb_wserver_exec
    This module exploits a remote stack buffer overflow vulnerability in ABB MicroSCADA. The issue is due to the handling of unauthenticated EXECUTE operations on the wserver.exe component, which allows arbitrary commands. The component is disabled by default, but requir

CVSS scores for CVE-2019-5620

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
7.5
HIGH AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2019-5620

  • The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
    Assigned by:
    • cve@rapid7.con (Secondary)
    • nvd@nist.gov (Primary)

References for CVE-2019-5620

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!