ABB will release a new version next month to fix an improper authentication issue in its eSOMS product, according to a report with NCCIC.
Successful exploitation of this remotely exploitable vulnerability, which ABB self-reported, requires an attacker to discover a valid user account, which could be used to gain access to the application without authentication.
An electronic shift operations management system, eSOMS Version 6.0.2 suffers from the issue.
Unauthorized access to the system can be achieved when LDAP is set to allow anonymous authentication, and specific key values within the eSOMS web.config file are present. Both conditions are required to exploit this vulnerability.
CVE-2018-14805 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.
The product sees use mainly in the chemical, defense industrial base, and energy sectors. It also sees action on a global basis.
No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.
Switzerland-based ABB plans to release a new version of eSOMS on September 28 to address this issue.
ABB recommends the following immediate actions:
Users running eSOMS Version 6.0.2 should ensure “Unauthenticated Authentication” (anonymous bind) is disabled in the LDAP configuration settings. In the eSOMS web.config file, ensure only the following key values are populated: “LDAP_Path,” “LDAP_User_Search,” and “LDAP_SSL_Enabled.” The remaining LDAP related key values are reserved for non-standard LDAP server configurations and are not normally required.
Users should contact ABB global customer care (GCC) for further guidance if they experience issues with implementing LDAP authentication using only the previously mentioned key values.
Users can click here to find more information in ABB’s security advisory ABBVU-PGGA-2018030.