ID

VAR-202206-1272


CVE

CVE-2022-31216


TITLE

plural  ABB  Product Link Interpretation Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2022-011890

DESCRIPTION

Vulnerabilities in the Drive Composer allow a low privileged attacker to create and write to a file anywhere on the file system as SYSTEM with arbitrary content as long as the file does not already exist. The Drive Composer installer file allows a low-privileged user to run a "repair" operation on the product. ABB of automation builder , Drive composer , mint workbench Exists in a link interpretation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. This vulnerability allows local attackers to escalate privileges on affected installations of ABB Automation Builder Platform. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the Drive Composer installer. By creating a symbolic link, an attacker can abuse the installer to overwrite a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM

Trust: 2.43

sources: NVD: CVE-2022-31216 // JVNDB: JVNDB-2022-011890 // ZDI: ZDI-22-1012 // VULHUB: VHN-422903 // VULMON: CVE-2022-31216

AFFECTED PRODUCTS

vendor:abbmodel:automation builderscope:gteversion:1.1.0

Trust: 1.0

vendor:abbmodel:mint workbenchscope:lteversion:5866

Trust: 1.0

vendor:abbmodel:drive composerscope:gteversion:2.0

Trust: 1.0

vendor:abbmodel:automation builderscope:lteversion:2.5.0

Trust: 1.0

vendor:abbmodel:drive composerscope:ltversion:2.7.1

Trust: 1.0

vendor:abbmodel:automation builderscope: - version: -

Trust: 0.8

vendor:abbmodel:mint workbenchscope: - version: -

Trust: 0.8

vendor:abbmodel:drive composerscope: - version: -

Trust: 0.8

vendor:abbmodel:automation builder platformscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-22-1012 // JVNDB: JVNDB-2022-011890 // NVD: CVE-2022-31216

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-31216
value: HIGH

Trust: 1.0

cybersecurity@ch.abb.com: CVE-2022-31216
value: HIGH

Trust: 1.0

NVD: CVE-2022-31216
value: HIGH

Trust: 0.8

ZDI: CVE-2022-31216
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202206-1523
value: HIGH

Trust: 0.6

VULHUB: VHN-422903
value: HIGH

Trust: 0.1

VULMON: CVE-2022-31216
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2022-31216
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-422903
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-31216
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2022-31216
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2022-31216
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-22-1012 // VULHUB: VHN-422903 // VULMON: CVE-2022-31216 // JVNDB: JVNDB-2022-011890 // CNNVD: CNNVD-202206-1523 // NVD: CVE-2022-31216 // NVD: CVE-2022-31216

PROBLEMTYPE DATA

problemtype:CWE-59

Trust: 1.0

problemtype:Link interpretation problem (CWE-59) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-269

Trust: 0.1

sources: VULHUB: VHN-422903 // JVNDB: JVNDB-2022-011890 // NVD: CVE-2022-31216

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202206-1523

TYPE

post link

Trust: 0.6

sources: CNNVD: CNNVD-202206-1523

PATCH

title:ABB has issued an update to correct this vulnerability.url:https://library.e.abb.com/public/0bc9ed3188ff43be94f2cbdc1751a72d/Vulnerabilities_in_Automation_Builder_and_Drive_Composer_and_Mint_WorkBench.pdf?x-sign=Dsvwu1eOxEWGDKECZJMzhUkv4wylDwof6PtNKvY8QFk+nBjFCRKlgeR096xY5FkJ

Trust: 0.7

title:ABB Drive Composer Post-link vulnerability fixesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=247273

Trust: 0.6

sources: ZDI: ZDI-22-1012 // CNNVD: CNNVD-202206-1523

EXTERNAL IDS

db:NVDid:CVE-2022-31216

Trust: 4.1

db:ICS CERTid:ICSA-22-202-01

Trust: 1.5

db:JVNid:JVNVU93357079

Trust: 0.8

db:JVNDBid:JVNDB-2022-011890

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-16276

Trust: 0.7

db:ZDIid:ZDI-22-1012

Trust: 0.7

db:AUSCERTid:ESB-2022.3566

Trust: 0.6

db:CS-HELPid:SB2022071810

Trust: 0.6

db:CNNVDid:CNNVD-202206-1523

Trust: 0.6

db:VULHUBid:VHN-422903

Trust: 0.1

db:VULMONid:CVE-2022-31216

Trust: 0.1

sources: ZDI: ZDI-22-1012 // VULHUB: VHN-422903 // VULMON: CVE-2022-31216 // JVNDB: JVNDB-2022-011890 // CNNVD: CNNVD-202206-1523 // NVD: CVE-2022-31216

REFERENCES

url:https://search.abb.com/library/download.aspx?documentid=9akk108467a0305&languagecode=en&documentpartid=&action=launch&_ga=2.38192870.478847987.1655218701-372504397.1647012599

Trust: 2.5

url:https://jvn.jp/vu/jvnvu93357079/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2022-31216

Trust: 0.8

url:https://www.cisa.gov/news-events/ics-advisories/icsa-22-202-01

Trust: 0.8

url:https://library.e.abb.com/public/0bc9ed3188ff43be94f2cbdc1751a72d/vulnerabilities_in_automation_builder_and_drive_composer_and_mint_workbench.pdf?x-sign=dsvwu1eoxewgdkeczjmzhukv4wyldwof6ptnkvy8qfk+nbjfcrklger096xy5fkj

Trust: 0.7

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-202-01

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-31216/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071810

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3566

Trust: 0.6

url:https://search.abb.com/library/download.aspx?documentid=9akk108467a0305&languagecode=en&documentpartid=&action=launch&_ga=2.38192870.478847987.1655218701-372504397.1647012599

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/59.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-202-01

Trust: 0.1

sources: ZDI: ZDI-22-1012 // VULHUB: VHN-422903 // VULMON: CVE-2022-31216 // JVNDB: JVNDB-2022-011890 // CNNVD: CNNVD-202206-1523 // NVD: CVE-2022-31216

CREDITS

Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative

Trust: 0.7

sources: ZDI: ZDI-22-1012

SOURCES

db:ZDIid:ZDI-22-1012
db:VULHUBid:VHN-422903
db:VULMONid:CVE-2022-31216
db:JVNDBid:JVNDB-2022-011890
db:CNNVDid:CNNVD-202206-1523
db:NVDid:CVE-2022-31216

LAST UPDATE DATE

2024-11-23T22:10:43.487000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-22-1012date:2022-07-15T00:00:00
db:VULHUBid:VHN-422903date:2022-06-24T00:00:00
db:VULMONid:CVE-2022-31216date:2023-09-13T00:00:00
db:JVNDBid:JVNDB-2022-011890date:2023-08-24T08:26:00
db:CNNVDid:CNNVD-202206-1523date:2023-07-25T00:00:00
db:NVDid:CVE-2022-31216date:2024-11-21T07:04:09.157

SOURCES RELEASE DATE

db:ZDIid:ZDI-22-1012date:2022-07-15T00:00:00
db:VULHUBid:VHN-422903date:2022-06-15T00:00:00
db:VULMONid:CVE-2022-31216date:2022-06-15T00:00:00
db:JVNDBid:JVNDB-2022-011890date:2023-08-24T00:00:00
db:CNNVDid:CNNVD-202206-1523date:2022-06-15T00:00:00
db:NVDid:CVE-2022-31216date:2022-06-15T19:15:11.367