CVE-2020-11639

Insufficient access control on Inter process communication,

Description

An attacker could exploit the vulnerability by injecting garbage data or specially crafted data. Depending on the data injected each process might be affected differently. The process could crash or cause communication issues on the affected node, effectively causing a denial-of-service attack. The attacker could tamper with the data transmitted, causing the product to store wrong information or act on wrong data or display wrong information. This issue affects Advant MOD 300 AdvaBuild: from 3.0 through 3.7 SP2. For an attack to be successful, the attacker must have local access to a node in the system and be able to start a specially crafted application that disrupts the communication. An attacker who successfully exploited the vulnerability would be able to manipulate the data in such way as allowing reads and writes to the controllers or cause Windows processes in 800xA for MOD 300 and AdvaBuild to crash.

Remediation

Solution:

  • ABB recommends changing any user account passwords which are suspected to be known by an unauthorized person. Interactive logon (both local and remote) is recommended to be disabled for service accounts. Please note that the vulnerability can only be exploited by authenticated users, so customers are recommended to ensure that only authorized persons have access to user accounts for the computers where AdvaBuild is used. All the vulnerabilities have been corrected in AdvaBuild version 3.7 SP3 released in April 2021. ABB recommends that customers apply the update at earliest convenience. Users who are unable to install the update should immediately look to implement the “Mitigating factors” listed below as this will restrict or prevent an attacker’s ability to compromise the system.

Category

7.8
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.02%
Affected: ABB Advant MOD 300 AdvaBuild
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-11639?
CVE-2020-11639 has been scored as a high severity vulnerability.
How to fix CVE-2020-11639?
To fix CVE-2020-11639: ABB recommends changing any user account passwords which are suspected to be known by an unauthorized person. Interactive logon (both local and remote) is recommended to be disabled for service accounts. Please note that the vulnerability can only be exploited by authenticated users, so customers are recommended to ensure that only authorized persons have access to user accounts for the computers where AdvaBuild is used. All the vulnerabilities have been corrected in AdvaBuild version 3.7 SP3 released in April 2021. ABB recommends that customers apply the update at earliest convenience. Users who are unable to install the update should immediately look to implement the “Mitigating factors” listed below as this will restrict or prevent an attacker’s ability to compromise the system.
Is CVE-2020-11639 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-11639 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-11639?
CVE-2020-11639 affects ABB Advant MOD 300 AdvaBuild.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.