CVE-2020-24686

AC500 V2 webserver denial of service vulnerability

Description

The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder. The execution of the PLC application is not affected by this vulnerability. This issue affects ABB AC500 V2 products with onboard Ethernet.

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.56%
Vendor Advisory abb.com
Affected: ABB AC500 V2 products with onboard Ethernet
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-24686?
CVE-2020-24686 has been scored as a high severity vulnerability.
How to fix CVE-2020-24686?
To fix CVE-2020-24686, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2020-24686 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-24686 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-24686?
CVE-2020-24686 affects ABB AC500 V2 products with onboard Ethernet.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.